LATEST VIRUS NAME..

    1.     Virus Name:     Virus:W32/Sality    A malicious program that secretly integrates itself into program or datafiles.It spreads by integrating itself into more files each time the host program is run.                    2.     Virus Name:           Trojan-Downloader:W32/Hiloti                    This...

Email Security...some Basic point

In today’s electronic world, email is critical to any business being competitive. In most cases it now forms the backbone of most organisations’ day-to-day activities, and its use will continue to grow. According to the The Radicati Group’s study, “Microsoft Exchange and Outlook Analysis, 2005-2009,” the worldwide email market will grow from 1.2 billion mailboxes in 2005 to 1.8 billion mailboxes in 2009.[sintuhack] As email becomes more prevalent in the market, the importance of email security becomes more significant. In particular, the security...

Secure Sockets Layer(SSL) versus Transport Layer Security(TLS)

               SSL AND TLS -What’s the difference and which one is more secure... BEFORE WE DECIDE WHICH ONE IS MORE SECURE ,WE MUST KNOW WHAT IS THESE?---Simply these are protocols that provide data encryption and authentication between applications in scenarios where that data is being sent across an insecure network, such as checking your email.[sintuhack] Now which one is more secure?[sintuhack] While SSL and TLS differ in ways that make them inoperable with each other, they...

Internet Surfing Security

 we people cant leave without internet,our life is completely depend on GOOGLE.This is not bad thing,but we must know some important security tips.how to keep save your data,as well as PC.Yesterday my friends PC is hacked during net surfing,and he lost all data.I am adding some security solution hope you people will adopt it  during net surfing and during downloading.                            Internet...

Shopping Safely Online

Why do online shoppers have to take special precautions?The Internet offers a convenience that is not available from any other shopping outlet. From the comfort of your home, you can search for items from countless vendors, compare prices with a few simple mouse clicks, and make purchases without waiting in line. However, the Internet is also convenient for attackers, giving them multiple ways to access the personal and financial information of unsuspecting shoppers. Attackers who are able to obtain this information may use it for their own financial...

Understanding Your Computer: Web Browsers

How do web browsers work?A web browser is an application that finds and displays web pages. It coordinates communication between your computer and the web server where a particular website "lives." When you open your browser and type in a web address (URL) for a website, the browser submits a request to the server, or servers, that provide the content for that page. The browser then processes the code from the server (written in a language such as HTML, JavaScript, or XML) and loads any other elements (such as Flash, Java, or ActiveX) that are...

What risks are associated with free email services?

Although free email services have many benefits, you should not use them to send sensitive information. Because you are not paying for the account, the organization may not have a strong commitment to protecting you from various threats or to offering you the best service. Some of the elements you risk are     * security - If your login, password, or messages are sent in plain text, they may easily be intercepted. If a service provider offers SSL encryption, you should use it. You can find out whether this is available by looking...

Understanding Hidden Threats: Rootkits and Botnets

What are rootkits and botnets? A rootkit is a piece of software that can be installed and hidden on your computer without your knowledge. It may be included in a larger software package or installed by an attacker who has been able to take advantage of a vulnerability on your computer or has convinced you to download it . Rootkits are not necessarily malicious, but they may hide malicious activities. Attackers may be able to access information, monitor your actions, modify programs, or perform other functions on your computer without being detected. Botnet...

Cyber Security Tip ST05-006

How do you know your computer is infected? Unfortunately, there is no particular way to identify that your computer has been infected with malicious code. Some infections may completely destroy files and shut down your computer, while others may only subtly affect your computer's normal operations. Be aware of any unusual or unexpected behaviors. If you are running anti-virus software, it may alert you that it has found malicious code on your computer. The anti-virus software may be able to clean the malicious code automatically, but if it can't,...

China Set to Fight Against Cybercrime by Issuing New Laws Against Hackers

ccording to Gu Jian, Deputy Director of the Network Security Protection Bureau of the Ministry of Public Security (MPS), China is all set to fight against the hacking attacks as the government is drafting law governing the punishment of hackers and other cyber offences, as reported by ShanghaiDaily on November 11, 2010. He further highlighted that presently, lawmakers are working on the judicial interpretations of the new law, which will be released by the end of 2010. Gu stated that nearly 80% of the machines in China are facing the problem...

Cyber Laws in India

                         Cyber Laws in India In May 2000, both the houses of the Indian Parliament passed the information bill. The Bill received the assent of the President in August 2000 and came to be known as the Information Technology Act, 2000. Cyber laws are contained in the IT Act, 2000. This Act aims to provide...

Cyber Law Cases in India and World

MYSPACE CATCHES A MURDERER MySpace has played an important role in helping Oakland police apprehend a 19-year old man accused of shooting a San Leandro High School football player Greg "Doody" Ballard, Jr. Oakland police had a street name of a suspect and were able to identify Dwayne Stancill, 19 of Oakland from a picture they found on a gang's MySpace page. Police brought the suspect to their headquarters where detectives say he confessed. What was most troubling to investigators was the lack of motive for the killing. OFFICIAL WEBSITE OF MAHARASTRA...

5 Free Antivirus – Download Free Antivirus and Save your computer from Virus Attack!

Today I switched my computer ON just like any other day and the hell broke lose. Computer was running slow, high-speed internet was acting choked and I almost thought my monitor belongs to a 16 year old sexually charged with adult pop-ups all over the screen. By the time I could figure out what went wrong (virus attack), I had already lost some data on my hard drive and my Operating System was acting weird. A computer that is inadequately protected is vulnerable to all sorts of viruses, spyware or malicious codes which could attack your data or...

Hacker compromises Royal Navy data security

The official Royal Navy website was shut down yesterday (8th November) after a hacker compromised its DATA SECURITY Computer details of former and current defence staff were posted online by an unknown Romanian citizen known only via his codename as TinKode. The hacker, who claims to have committed the breach after detailing the incident on his blog, posted the "hash values" for staff passwords on the internet. These hash values are essentially a key for cybercriminals to enable them to easily crack user passwords. According to the Ministry...

Cyber attacks enter new phase......INCREASE YOUR SECURITY LEVEL

North Korea was originally a prime suspect for launching the cyber attacks, but the isolated state was not named on a list of five countries where the attacks may have originated, the Korea Communications Commission (KCC) said. The attacks targeting dozens of government and business sites in South Korea and the United States did not cause major damage or security breaches, experts said, but the KCC warned a new phase could cause severe damage to PCs. Leading South Korean web security firm Ahnlab, which has closely examined the attacks, said...

Mobile scams 'costing users five times more than PC scams', security firm warns

As the number of people using the mobile internet continues to rise rapidly, criminals are exploiting new technologies with increasing efficiency, the latest research suggests.With smartphones predicted to outsell PCs in 2011, the survey, commissioned by mobile security firm AdaptiveMobile, indicates that traditional spam email successfully persuades fewer than one in a million users to visit the site it’s advertising. So-called “conversion...