Posts under Security tag.

Avoid Online Shopping Fraud & Holiday Season Scams

The holiday season is synonymous with festivities, cheer, and mirth. It is also that “much-awaited time of the year” when flashy discount signs lure shopaholics with their special festive promotions and offer: the beginning of the “Sale Period”. While you […]

How to remote wipe Windows 10 laptop

A laptop is a place where we store all the important information both personal and company related sensitive documents. If god forbid, a laptop goes missing or is stolen anytime; we cannot afford to leak out the sensitive information. During such […]

Hosts file in Windows 8

How to Lock, Manage, Edit Hosts File in Windows 10

The Hosts file in Windows 10/8/7, is used to map hostnames to IP addresses. This Hosts file is located deep down in the Windows folder. It is a plain text file, and the size of the original default Hosts file […]

Spybot Identity Monitor lets you find breached online accounts

Attackers are leaking passwords and online accounts and selling them on various platforms. If you are using online services and you think that your password has been compromised, you can use this tool called Spybot Identity Monitor. Spybot Identity Monitor […]

Attack Simulator office 365

What is Office 365 Attack Simulator? How to use it?

If you are using Office 365 Threat Intelligence, you can set up your account to run simulations of real-time phishing and brute force attacks on your corporate network. It helps in preparing for such attacks in advance. You can teach […]

Office 365 capabilities that let you defend yourself from Cybercrime

The rising incidents of cyber attacks across the globe call for increased protection on the internet user’s front. Robust security solutions equipped with right tools can help protect your devices, personal information, and files from being compromised. Microsoft Office already […]

How to view the Advanced Threat Protection Reports

Advanced Threat Protection (ATP) service in Windows helps you prevent zero-day malware attacks by analyzing inbound email attachments for any new threats and blocking them right away. Every ATP classifies a threat into: Clean – File classified has a minimal […]

How to set up ATP Safe Attachments policies in Office 365

End users must be protected from unknown/unwanted threats. While there are many good antivirus systems available, the need for more than one antimalware capable of providing an additional layer of security always exists. Fortunately, Office 365 Advanced Threat Protection offers […]

Windows SmartScreen can’t be reached right now

Most cyber-attacks involve downloading an infected software on the system. The malware is disguised as a genuine application, and thus many internet users are deceived into downloading them. Microsoft is aware of this. Microsoft introduced a feature called Windows SmartScreen […]

Understand and Manage Java Settings in Windows 10

Adobe Flash and Java are two downloads most of us have installed on our Windows computers, as they give us a richer internet and browsing experience. We have already seen how to manage Adobe Flash Settings. Today we will learn […]