Archive for the ‘Safety rules’ Category

shutterstock_181045061

Smartphone Security: Android vs. iOS

When first powering up a new notebook or desktop computer, the first thing a security-savvy person does is make sure security is set up and working. Those who would steal information, use your computer as a launching pad for malicious programs, or are simply out to cause trouble are constantly on the prowl. They use [...]

Share

Shrturl: link shortened with fake web pages

Many users on social network use the short link services which comes to reduce the URL of the shared link. this helps on certain website such as twitter where you are allowed to post only 140 characters per post. on the other hand and from the security prospective this may involve negative points such as [...]

Share
cybermonday2

Moms: Protect Yourselves on Cyber Monday

Shopping with your kids on a normal day is a hassle. That hassle becomes a lot worse on Black Friday, when there’s a risk of losing your kids in the crowd, or worse, having them kidnapped, as Forbes cautions. Luckily for moms everywhere, there’s Cyber Monday, a day of online deals. Cyber Monday’s been growing [...]

Share

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Monthly Report

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) released their monthly monitor report in collaboration with US-CERT, the report focus to assist the community with ways to secure and protect their environment. If we look at the report it is stated the increase of highly sophisticated malwares that are targeting different operating and industrial [...]

Share

The Cloud Security Rules Book

The Cloud Security Rules book is available on Amazon.com and selected book stores from October 2011. This book targets decision makers in organizations worldwide. Whether you run a small company, is the president of a global NGO, or the CISO of a well-known brand – this book brings you relevant knowledge about security in the [...]

Share

10 Ways a Computer Virus is Like the Flu

I was noticing, a while back, that my computer and I have some things in common. In particular, we are seriously similar in how we act when we get sick. Here are 10 ways that a computer virus is like the flu, or, if you like, 10 ways my computer with a virus is like [...]

Share

NSA Presents “Best Practices for Keeping Your Home Network Secure”

‘Best Practices for Keeping Your Home Network Secure’ is a new document published by the National Security Agency, this document comes to help and provide simple users a path for keeping their system secure and protected. Home users are faced by many security troubles, applying all required security measures are complicated due to the fast [...]

Share