18Feb

Background of Password cracking

Passwords to access computer systems are usually stored, in some form, in a database in order for the system to perform password verification. To enhance the privacy of passwords, the stored password verification data is generally produced by applying a one-way function to the password, possibly in combination with other available data.
 
18Feb

5 Simple Steps To Protect Yourself Against Identity Theft

Are you the victim of identity theft? According to Joanna Crane of the Federal Trade Commission's Identity Theft Program, 80% of the victims who call the FTC say they have no idea how it happened.
 
18Feb

5 Mistakes You Might Be Making When Choosing A Password

Are you making yourself a target for fraud? More and more often I am hearing stories of people who have had their accounts hacked. They have had money stolen, lost sleep, spent hours setting up new accounts, or had their credit ruined. Don't let this happen to you. Are you making these dangerous mistakes?
 
21Aug

Why Free WIFIs could be stealing your identity

We've all done it, connected to the free WIFI so you can smash down some downloads, or save some mobile broadband data from your mobile phone plan. But what assurances do you have that the provider is not caching your data, and what happens when the WIFI network comes to visit you?
 
17Aug

Identity Theft and Social Engineering

For almost a decade, international and topical regional media coverage has increased regarding cybersecurity incidents and perceived attacks. Governments and corporations have become more concerned with the varying types and complexity of cyberattacks such as spear phishing, social engineering and ransomware. The growing cyber threats that organisations have had to deal with are becoming more sophisticated.
 
18Feb

10 Tell Tale Signs of Spyware and Adware Infection

Though there are no warning signs to indicate that spyware or adware is being installed on your system, there are several tell tale signs to alert you of their presence, once they install. I have compiled here for your convinence 10 tell tale signs that can warn you of the presence of adware or spyware on your computer. Here they are.
 
18Feb

Spoofing, Phishing, and Link Altering - Expensive Financial Traps

A growing rank of Internet crooks are now using new tricks called "phishing" and "spoofing" to steal your identity. Bogus e-mails that attempt to trick customers into giving out personal information are the hottest new scam on the Internet.
 
7Aug

Building the Human Firewall

It may be no surprise to some, but the biggest weakness in any firewall is in fact the operator. For all the most sophisticated systems, rules, and datasets we protect and guard... It is the operator in the chair who subverts their own security.
 
19Dec

Tracking spammers through their emails...

Spam. It has been a bane of network administrators, users, and phishing targets for as long as most users today have been alive (if you were born after the mid 1970s that is)... So how does one track the sender of an email message, or the source of a spam message? Simple, we need to read the metadata within the email itself.
 
19Aug

Prevent phishing from stealing your identity, and life.

Technology has brought along with it some offenders who have found many ingenious and malicious ways to leverage the world wide web to deceive people. They do this by robbing people of their individuality and their life savings through confidence scams (referred to here as phishing).
 

Subcategories