x

US blames North Korea for cyber-attack

Dec 19, 2017 | Blog

White House homeland security adviser Tom Bossert, said that United States believes North Korea was behind the “WannaCry” cyber-attack earlier this year. This is the first time that the accusation of another country for the cyber-attack was made officially. The US has evidence to support this, while UK and Microsoft came to similar conclusions in their analyses of the attack. The “WannaCry” attack was one of the most devastating acts of cyber-terrorism in recent times. In May, Windows computers that were hit by this cyber-attack had their contents locked, with users asked to pay a ransom in order to have their data restored. This fast-spreading malware locked down several computers in the UK’s NHS hospitals and displayed a message prompting users to pay $300 in Bitcoin to decrypt the files and restore them to working order.

The most important computer security threats that you need to be aware of

Jun 15, 2016 | Blog

Security threats to computers are always evolving. Therefore we need to constantly change and innovate on how we protect our devices and keep them safe and secure. Here in this blog post, we mention some of the most important threats that you need to be aware of. This is so you can better equip yourself and not fall prey to these dangerous problem causing issues. So what are the threats? Viruses: In terms of frequency, viruses are the most widely prevalent. Viruses infect the computer without the user’s knowledge. They keep on replicating themselves and grow to vast sizes. In the worst of cases they damage the computer by deleting files or formatting the hard disk. These viruses also clog up the computer’s memory to slow it down and cause erratically abrupt changes in its functioning. Even after removing a virus, its after effects can still be very dangerous as many viruses leave back doors for their counterparts or other codes to exploit. So using this back door, another...

Facebook is Taking Security to a Whole New Level

Mar 28, 2016 | Blog

Anyone who uses modern technology today understands the importance of security. This not only concerns your mobile devices, but also includes all your different application accounts - be it Facebook, WhatsApp , and your email too. Even with a social media platform as large as Facebook that connects millions of people around the globe, impersonation and harassment continue to be a major issue that springs up far too frequently. Therefore, issues like these also need to be dealt with on a higher level and priority basis. Why Does Facebook Need to Increase Its Security? Facebook needs to increase its security because harassment and impersonation is definitely a cause of concern. Even though not everyone’s accounts are affected by this at least, a lot of people are being targeted and put at risk. It is generally believed that women are most vulnerable to such mal-practices and it is never a bad idea to increase your security. Even Facebook itself announced that the purpose of...

Apple Users Hacked for the First Time by Ransomware

Mar 14, 2016 | Blog

The need for security has never been felt this critically as one of the most powerful and secure operating systems: Apple’s Mac computers got hacked by a malicious transmission program over the weekend. This incident occurred for the very first time and the reason it shocked many around the world is because Apple’s system is not easily susceptible to such attacks or viruses. What Exactly is the Malware Virus? The malicious software called “ Ransomware ” falls under the class of malware which works by hiding in applications and programs one may hastily download. Its main point of attack is that it encrypts a user’s files and hard drive which locks the victim’s computer unless the user sends the hackers ransom money. In order for users to retrieve control of their data, they are required to send money in hard-to-trace digital currencies which gives these users access to a specific key. The amount usually adds up to 1 Bitcoin which is around $400 before the hackers release the...

3 Tips on Keeping Your PC Cleaner

Mar 13, 2016 | Blog

PC cleanup is the one thing you can do daily that will offer you more disk memory space and assist in freeing up your valuable system resources. In addition, actual physical cleanup, such as dusting will actually help your computer breathe easier and in turn, extend the life of your PC. Here are a few practical tips that you should know on how to keep your PC cleaner . Uninstall Unnecessary Applications Even if you are extremely careful about the websites you visit and the applications you install on your computer, unnecessary programs or apps will still without a doubt creep their way in. Whether through unpatched exploits in the operating system or via widely used apps, user indifference, or even an accidental “OK” click in a dialog box may eventually lead to multiple unnecessary programs showing up on your Windows-based system. Scan your PC now to find out which programs are slowing your PC down. Getting rid of unnecessary programs will free up your system’s...

Use Two-Step Verification to Strengthen Your PC’s Security

Feb 23, 2016 | Blog

Just as no one can deny the importance of computers in this technologically progressing world, no one can also deny the importance of security for all the valuable information these computers contain. This is why there’s a need for ever new and advancing techniques for keeping your PCs (with all their information) as safe and secure as possible. In this blog we’re going to discuss some of the latest emerging 2-step verification techniques that give you enhanced security for your personal accounts and devices. This added level of security costs nothing and may even help prevent prying eyes from gaining full access to your Facebook, Gmail, or other private information when you step away for a few minutes. It may sound complicated, but it’s really simple. Here’s how it works. You Will Need a Mobile Phone for This The 2-step verification process is broken down into two simple steps, that’s right, 2 steps. The first is setting your main password which is further protected by a...

Why Do We Need an Antivirus Service?

Feb 04, 2016 | Blog

Nowadays, numerous aspects (both positive and negative) have accompanied the technological advancements in the telecommunication sector. Some of the positive aspects include increased Internet accessibility, development of super programming languages and consequently the invention of better software and programs. On the negative side, there has been an increase on cybercrime and the probability of young kids being exposed to extremely harmful content. More alarming is the invasion of viruses with the ability to cause total system damage. This calls for a counteractive measure and an antivirus program such as PC Cure+ and Viracure Antivirus which are proven to serve and protect their users best. Top 3 Advantages of a Good Antivirus Service 1. Protection from viruses – of course Viruses are the most common form of threats known to harm and infect people and their PC systems. Viruses come in multiple forms and are contracted from many different sources as well. A few...

The Simplest Way to Remove Malware From Your PC

Jan 20, 2016 | Blog

The term “malware” is an abbreviation for what is known as “malicious software.” Malware is used to attack computers and steal sensitive information from unsuspecting PC users. You never know who’s on the other side of the internet and trying to steal your personal information, which is why it’s always advised to scan your PC on a regular basis. Scan. Scan. Scan. Malicious and invasive software comes in many different forms and can be contracted via hostile programs, code or even web content. Malware can also serve many different functions such as logging your keystrokes, installing adware and enabling viruses to attack your computer. You should scan your PC for malware all the time just to be safe. Scan Your PC Now with PC Cure+ Using an Antivirus Getting a virus can be easy. However, it can be very hard to detect if your PC has been compromised by malware without a quality antivirus software. But, often times even having a good antivirus program may not be...

One Million New Computer Viruses Are Created Every Day

Dec 22, 2015 | Blog

Here’s how to protect your PC. Earlier this month, the global tech community was astonished to learn that the amount of malware in circulation on the Internet has increased by an astounding figure of 500 times over the course the past ten years. Evgeny Kaspersky, the chairman and CEO of Kaspersky Lab, revealed the frightening statistic during a special conference at the National Polytechnic University of Armenia. Shield Your PC From Viruses Kaspersky’s tech security firm specializes in collecting and studying millions of viruses on the Internet. The company’s virus collection consists of a massive cache of 260 million unique virus samples. When commenting on the breadth of the company’s virus collection, Kaspersky stated that the number of viruses in circulation is constantly increasing and that his company is undergoing a huge burden collecting, “thousands and even millions of malicious files a day." The verification of this daunting data paints a dire picture...

10 key points on PC security from Dan Geer

Dec 22, 2015 | Blog

Dan Geer is an expert in computer system security with extensive knowledge in his field. He currently holds the position of Chief Information Security Officer at In-Q-Tel , which is a non-profit venture capital firm. Giving a keynote at Black Hat USA last year, Geer presented his idea for implementing relevant Internet security recommendations that should transform the Web into a secure environment . So, here's a summary of the key points of his speech: • Reporting in cases of cybersecurity failures should be mandatory According to Geer, failures in cybersecurity could be drastically reduced if organizations would implement policies, such as mandatory reporting . He expounded his idea - in cases of severe failures , reporting is a must, however, if failures are less severe, reporting should be optional and an act of volition. • Internet providers should have two net neutrality options This point emphasizes liability for harmful content . Geer...

Keeping Your Mobiles and Smartphones Safe

Dec 22, 2015 | Blog

Mobiles have revolutionised communication. At first they were simply gadgets meant to make calls. The attachment has however grown with some people into an addiction to their smartphones. Though there are many advantages attached to owning mobile phones, so are there disadvantages. For instance, most users risk being mugged all in a bid to get a hold of their expensive mobiles. On a more advanced level, smartphone users face the risk of hacking whereby all your information might get into the wrong hands. The more mobiles you own, the more problems Like any other ground-breaking invention, mobiles and mobile phone parts have had their fair share in the black market. Walking around in the streets with one too many mobiles may attract some unwanted attention. Numerous reports of mobile phone thefts are reported on a daily basis. Seems everyone wants to get hold of a good phone , but not all are willing to pay the price. Here comes the question; what can one do to steer clear of...

Best Online Shopping and Banking Precautions

Dec 22, 2015 | Blog

Two decades after e-commerce was introduced back in the 1990’s, IT security issues such as fraud, theft among others are still a hindrance to this wonderful innovation. Despite an aggressive digital evolution, as well as a whole industry based on IT security, digital criminals such as hackers and phishers still terrorize users of these services. Despite these challenges, many people are still turning to online shopping as well as banking. With this increasing popularity, it leads us to ask, how do we enhance our safety to facilitate the best online shopping experience? Avoid using Auto-fill features and cookies Most people prefer to login using cookies and auto-fill features since it is easy and faster. However, it is important to note that when you login into any sites that have your user info, or into your banking site, easy and fast never equates to safe and secure . To lower the risk of sensitive info from being pilfered, it is always advisable to take time and login to...

What’s All the Fuss about Shellshock? What is Shellshock Anyway?

Dec 22, 2015 | Blog

You must understand cybercrime, in order to fight it Shellshock is a newly discovered vulnerability that allows hackers to control your PC commands, by injecting code into it. This vulnerability is pretty dangerous (even deadly) to your system server because it puts your Mac or Linux at serious risk of getting infected by a malicious threat. Although, the most important fact is that it’s not unbeatable . If you keep reading, you’ll find out what Shellshock is, how you can be attacked, and what to do IF you do get attacked, as well as what you should worry about in general in order to prevent it.   How bad is Shellshock? Shellshock scores a perfect 10 for potential impact and exploitability, according to the National Institute of Standards (NIST), and that should be the biggest cause for concern.   How does it attack your system? Shellshock uses a “ Bash ” script to access your computer. This script can only affect UNIX-based systems, and...

Travelers Beware! Hackers Attack Hotel Rooms, Too! Here Are Top Travel Safety Tips

Dec 22, 2015 | Blog

Yes, it could happen to you too So far, the only worry you’ve had on a vacation was if you brought everything you needed and whether it will be safe under lock and key. Today, hacking has reached a higher level that you can’t even imagine what hackers are capable of doing. Hackers can control all the devices in your hotel room, from the lighting, TV sets, thermostats, to the window blinds. This might be uncomfortable to experience, and a little bit scary, because you have no control, unless you know how to stop them. That’s why you need to stick to some general travel safety tips, even though sometimes you can’t control what’s happening, you absolutely have to know what could happen to you too.   Here’s one AMAZING STORY about what happened in St. Regis Shenzhen hotel After staying in the five star, St. Regis Shenzhen hotel, in China, a guest from Spain, Jesus Molina, accidentally discovered a new way to manage the devices in the rooms . He almost...