Web
Image via Wikipedia Cloud computing involves the use of servers that are located far away (in clouds) for storing and managing data. It is...
Hi, what are you looking for?
Image via Wikipedia Cloud computing involves the use of servers that are located far away (in clouds) for storing and managing data. It is...
Image by Getty Images via @daylife It appears that the world’s most popular social-networking site, Facebook, has finally bowed to pressure concerning its privacy...
A recent study, presented by Google at the Usenix Worshop on Large-Scale Exploits and Emergent Threats in California, warns that “fake software security programs...
This is the third of a four-part series on passwords. Part 1 – 6 Common Mistakes to Avoid When Choosing a Password Part 2...
This is the first of a four-part series on passwords. A lot of the responsibility of ensuring our safety on a computer network such...
It is extremely important to understand the meaning and effects of botnet attacks before considering the how to deal with it. The following are...
Following Microsoft’s landmark court victory against the Waledac botnet network, the organisation has reminded users of the importance of checking their computers for malware...
On Tuesday, 13th October, Microsoft released its biggest software patch on record since June 2009. This latest release is meant to deal with a...
Finally it appears that the prayers of those who criticised the launch of the first ever mobile phone directory in the United Kingdom, has...
Email scams are not uncommon nowadays and they come in different shapes and forms. In fact, such is the popularity of these attacks, that...
The recent discovery of two new forms of malicious programs in Mac OS X, has made security experts sit up and take notice. This...