Tagged: security

Business Email Threat Alert

The threat landscape is constantly evolving with new ways to attack being developed by criminals every day. The threat is especially dangerous for businesses whose email contains important financial and proprietary information. Take a look at these rising threats and a few ways to protect yourself.

Police use Bluetooth Messages to fight crime

Bluetooth technology is widely used within our techno-savvy society. It is used in targeting at-risk and youth groups in reducing crime and heightening awareness. How are police officers taking advantage of the technology? They are spreading messages to mobile users about crime prevention. The messages include safety tips while out on the town. Law enforcement agencies are using wireless protocols in raising awareness in combating crimes while keeping our youth safe when out partying with friends.

Passwords in iPhone or iPad devices can be retrieved within minutes

Do you own an iPhone or iPad? You must have had tens or hundreds of iPhone applications installed on your device and may be using them to access online services that require your credentials. Scientists at the Fraunhofer Institute for Secure Information Technology(SIT) test laboratory in Germany have demonstrated how your lost iPhone or iPad can be jailbreaked to gain access to its command shell.

Microsoft to put an end to Autorun in Windows

Microsoft’s Autorun feature has been a boon for many users but hackers have also been using it to input malwares without user authorization. Microsoft will soon release an update that it calls an “important but Non-Security” update that will remove the Autorun feature in Windows.

How to delete cookies of selected sites

Sometimes you need to delete the cookies from selected sites or from a single site to clear specific preferences without deleting all Browser Cookies. You can do this through a little workaround with Firefox Options or by using Remove Cookies for Site addon for Firefox.

Online text encryptors

Encryption is basically a process of transforming data (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except for those possessing special knowledge, usually referred to as a key. The encrypted information or the ciphertext is the end result that can be changed to the original form using decryption process (the reverse of encryption). Encryption has its wide use when it comes to transferring data securely. There are some online text encryptors as well that are available for free.

Foxit Reader releases Security patches

One of the most popular alternatives for Adobe Reader, the Foxit reader has announced security patches for some of its vulnerabilities that were discovered some time ago. Many of us know that Foxit Reader is a very easy to use tool for reading PDF documents and one need not bear the hassle of installing the software, it can be used by just copy-pasting.

Internet Explorer’s Bug Patch to be Released

Microsoft is going to launch the patch for the Internet Explorer’s bug called Zero Day Vulnerability. Because of this bug, several websites suffer from a malicious JavaScript, which targets Internet Explorer 7. It may execute a series of redirections to multiple URLs to finally connect to one of several different domains.