How to Secure Your PC from Being a Part of Botnet

The recent Mariposa scam which revealed the compromising of 12.7 million computers shows the extent and severity of botnet problem. Mariposa is only one of them; there are many more such botnets like conficker, kraken, srizbi, Zeus, Zdbot, etc which have compromised millions of computers that are connected to internet today. And these in turn are actively trying to infect more and more computers every day. An

Continue Reading

Ideal NTFS Formatting in Windows

The advanced features of NTFS (New Technology File System) like recoverability in the event of a system failure, file compression, security controls for files, EFS (Encryption File System), Disk Space Quota management, etc., has made it preferable over FAT file system. Unless in situations like using multiple-boot configuration – NTFS is an ideal file system to use for your hard drive.

Before Formatting an NTFS volume

Continue Reading

Hackers who created botnet with 12.7 million computers busted

Spanish police working with the FBI and other police forces have arrested three suspects for running world’s biggest computer hacking scam through a bots network called Mariposa.

This is a crucial win for security experts over hackers and a relief to millions of people who use internet everyday. The network of mariposa botnet is spread around 190 countries infecting over 12.7 million computers. These included computers

Continue Reading

Why Internet is Wild West Today?

Today almost every user browsing Internet is at risk. The increase in threats related to social networking sites, banking security, botnets, and attacks targeting users, businesses, and even applications made Internet a risky landscape. Many industry consultants and analysts refer Internet as ‘Wild West’ because of its huge insecurity, where nobody or no website can be trusted. Every year, cyber crime costs billions of dollars to repair systems

Continue Reading

How safe is a Remote Backup Service?

There are many service providers who offer online back up services. Some of them are Mozy, BackupandShare.com, Citadel Remote Backup, SafeCopy Backup, Iron Mountains, ElephantDrive, Xdrive, Genie Online Backup, AT&T Online Vault, Carbonite, eSureIT, iBackup. These are only a few to name.

Remote back up service are mostly suitable for individuals and small businesses. However, any of them trying these services without a good broadband connectivity

Continue Reading

Open Source Utility for Enhanced Password Security

With the increase of online banking, online e-mail, online purchases, etc., there is a need for increased password security. If you are like many people who use the same password for most sites, you are in trouble if your password gets hacked. You need to make your passwords complex and tough to crack and create a separate password for each account. Once you create a different complex password

Continue Reading

Technical Tips to Prevent Phishing

Many anti-phishing browsers have been implemented till date and some of them include embedding features in browsers, as extensions or toolbars in browsers, and as part of website login procedures. Most websites that are targeted for phishing are secure, meaning that SSL with strong cryptography is used for server authentication. In principle, it should be possible to confirm the site using the SSL authentication, but in practice, it is easy

Continue Reading

Why Should We Run Windows Updates Regularly?

Security updates are delivered on the second Tuesday of each month, which is called “Patch Tuesday”, but security updates can be delivered whenever a software update is required to prevent an exploit targeting Windows users. Windows Update can be configured to install updates automatically, to ensure that a computer is always up-to-date and not vulnerable to computer worms and other malware.

Continue Reading

Impact of Junk Emails on Corporates

Unsolicited email was first considered a bit of joke earning the jocular name of spam. However, as the spam volumes rose to epidemic proportions what was a minor crisis in the life of an IT professional soon snowballed into a major crisis. Factual figures estimate that spam amounts to nearly 95 percent of all emails. According to Jupiter Research reports, the active email consumer received a shocking 3253

Continue Reading