Wireless network security

Position your router or access point carefully Wireless signals can transmit a few hundred feet, so the signal from your network could be broadcast outside of your home. You can help limit the area that your wireless signal reaches by positioning your router or access point close to the center of your home rather than near an outside wall or window. Change the default SSID Routers and access points use a wireless network name known as a service set identifier (SSID). Most manufacturers use the same SSID for all of their routers and access...

malicious programmes or malwares attack

About one-third of Internet users in the country were attacked by web-borne malicious programmes or malwares during the July-September period this year, a report by security solutions provider Kaspersky has said. Kaspersky Lab products detected 21,946,308 Internet-borne malware incidents on the computers of participants durign July-September, the report said, adding 33.8 per cent of users were attacked by web-borne threats during this period. These attacks require user participation, with the user having to download the malicious file to their...

Ransomware : A new kind of Maleware

Ransomware is a kind of malware (malicious software) that criminals install on your computer so they can lock it from a remote location.  Ransomware generates a pop-up window, webpage, or email warning from what looks like an official authority. It explains that your computer has been locked because of possible illegal activities on it and demands payment before you can access your files and programs again. e.g. How...

A to Z about Tech Support Scams

In a recent twist, scam artists are using the phone to try to break into your computer. They call, claiming to be computer techs associated with well-known companies like Microsoft. They say that they’ve detected viruses or other malware on your computer to trick you into giving them remote access or paying for software you don’t need. These scammers take advantage of your reasonable concerns about viruses and other threats. They know that computer users have heard time and again that it’s important to install security software....

Government and media websites shut down as cyber-attack fears plague region on 63rd anniversary of Korean war

Several government and media websites in South and North Korea were shut for several hours on the 63rd anniversary of Korean war, and Seoul said its sites were hacked and alerted people to take security measures against cyber-attacks. It was not immediately clear whether the shutdown of North Korean websites, including those belonging to Air Koryo and the Rodong Sinmun newspaper, was triggered by hacking. Rodong Sinmun, Uriminzokkiri and Naenara websites were operational a few hours later. South Korean national intelligence service officials...

Phishing Attack

Phishing is a type of Internet fraud, the criminal counterfeit copy of a popular Internet service (no email service, internet banking website and social networking sites) to create and make them attractive to users.                            According to reports around the world last year, averaging 1.02 million phishing attacks every day. The report stated, '2012-13 102 100 phishing attacks worldwide internet users every day have to face. Every day, 19,000 in Russia, 12,000...

About Tech support phone scams

Cyber criminals don't just send fraudulent email messages and set up fake websites. They might also call you on the telephone and claim to be from Microsoft. They might offer to help solve your computer problems or sell you a software license. Once they have access to your computer, they can do the following: Trick you into installing malicious software that could capture sensitive data, such as online banking user names and passwords. They might also then charge you to remove this software. Take control of your computer remotely and adjust...

India's share of the worldwide Internet phishing attacks in April 2013

India's share of the worldwide Internet phishing attacks has risen to around 8 per cent. The number of Internet users in the country of 137 million. Phishing attacks in India in April 2152. In April, as phishing attacks worldwide Internet network in India at 8 per cent of them were. According to EMC Storage Solutions IT firm, phishing attacks, India's position in the U.S., UK and South Africa to the fourth position. NYSE listed by EMC's RSA security division may report fraud that in April of 2013, total 26 902 cases of phishing. Such phishing...

Cyber Crime

Every time one jumps on to surf the wonderful World Wide Web they are susceptible to a cyber crime! Understanding the top five computer crimes is valuable information for the novice and even expert internet surfer reports(Cyber Crime) 1 Child Pornography(Cyber Crime)  Sad but true, child pornography makes this list. Child pornography is among the fastest growing criminal segments on the Internet. Child pornography is publishing and transmitting obscene material of children in electronic form. In recent years child pornography has increased...

Computer Virus Infection indicators:

We want to install latest antivirus in our PC and after installation we think our computer became safe and secure but we have to know our computer is infected or not,for this there is no need of huge technical skill simply monitor your PC and find out is behave of your PC match  with following behave. Virus Infection indicators: Your computer always stops responding when you try to use Microsoft Office products. You cannot start Windows Task Manager. Antivirus software indicates a virus is present. You received an e-mail message...