The recent Mariposa scam which revealed the compromising of 12.7 million computers shows the extent and severity of botnet problem. Mariposa is only one of them; there are many more such botnets like conficker, kraken, srizbi, Zeus, Zdbot, etc which have compromised millions of computers that are connected to internet today. And these in turn are actively trying to infect more and more computers every day. AnContinue Reading
The advanced features of NTFS (New Technology File System) like recoverability in the event of a system failure, file compression, security controls for files, EFS (Encryption File System), Disk Space Quota management, etc., has made it preferable over FAT file system. Unless in situations like using multiple-boot configuration – NTFS is an ideal file system to use for your hard drive.
Before Formatting an NTFS volumeContinue Reading
Spanish police working with the FBI and other police forces have arrested three suspects for running world’s biggest computer hacking scam through a bots network called Mariposa.
This is a crucial win for security experts over hackers and a relief to millions of people who use internet everyday. The network of mariposa botnet is spread around 190 countries infecting over 12.7 million computers. These included computersContinue Reading
Today almost every user browsing Internet is at risk. The increase in threats related to social networking sites, banking security, botnets, and attacks targeting users, businesses, and even applications made Internet a risky landscape. Many industry consultants and analysts refer Internet as ‘Wild West’ because of its huge insecurity, where nobody or no website can be trusted. Every year, cyber crime costs billions of dollars to repair systemsContinue Reading
There are many service providers who offer online back up services. Some of them are Mozy, BackupandShare.com, Citadel Remote Backup, SafeCopy Backup, Iron Mountains, ElephantDrive, Xdrive, Genie Online Backup, AT&T Online Vault, Carbonite, eSureIT, iBackup. These are only a few to name.
Remote back up service are mostly suitable for individuals and small businesses. However, any of them trying these services without a good broadband connectivityContinue Reading
Now-a-days cyber criminals are using popular events, current developments and even movie premieres to attract people who seek free or pirated content and exploiting.
A recent online scam which promises viewers to download the recent “Twilight – New Moon” movie is found to install malware in PCs.
The entire process of this scam is as follows…
- Viewers are lured
With the increase of online banking, online e-mail, online purchases, etc., there is a need for increased password security. If you are like many people who use the same password for most sites, you are in trouble if your password gets hacked. You need to make your passwords complex and tough to crack and create a separate password for each account. Once you create a different complex passwordContinue Reading
Many anti-phishing browsers have been implemented till date and some of them include embedding features in browsers, as extensions or toolbars in browsers, and as part of website login procedures. Most websites that are targeted for phishing are secure, meaning that SSL with strong cryptography is used for server authentication. In principle, it should be possible to confirm the site using the SSL authentication, but in practice, it is easyContinue Reading
Security updates are delivered on the second Tuesday of each month, which is called “Patch Tuesday”, but security updates can be delivered whenever a software update is required to prevent an exploit targeting Windows users. Windows Update can be configured to install updates automatically, to ensure that a computer is always up-to-date and not vulnerable to computer worms and other malware.Continue Reading
Unsolicited email was first considered a bit of joke earning the jocular name of spam. However, as the spam volumes rose to epidemic proportions what was a minor crisis in the life of an IT professional soon snowballed into a major crisis. Factual figures estimate that spam amounts to nearly 95 percent of all emails. According to Jupiter Research reports, the active email consumer received a shocking 3253Continue Reading