What Can I Do If I Forget My IRCTC E-wallet Transaction Password? screenshot

What Can I Do If I Forget My IRCTC E-wallet Transaction Password?

The Indian Railway Catering and Tourism Corporation (IRCTC) is a subsidiary of the Indian Railways that deals with the catering, tourism and online ticketing transactions of the Indian railways. They describe...

Read more
July 30, 2018
How to Protect Your Computer from a Ransomware Attack screenshot

How to Protect Your Computer from a Ransomware Attack

It must be said that as far as illegal money-making schemes on the Internet go, ransomware operations seem to be among the most clever ones. If it's done correctly, it's the (nearly) perfect crime because you...

Read more
July 27, 2018
Even Security Professionals Continue to Reuse Passwords, Study Finds screenshot

Even Security Professionals Continue to Reuse Passwords, Study Finds

We can only imagine that being a security expert is not easy. You spend years trying to tell people that they should really start taking their online safety seriously, and yet, the constant barrage of successful...

Read more
July 27, 2018
Pay Attention to the Signs When Your Phone Has Been Hacked screenshot

Pay Attention to the Signs When Your Phone Has Been Hacked

There's no denying that smartphones have become the gadget that defines the early 21st century. Whether you're young or old, whether you live in a global superpower like the United States or a small eastern European...

Read more
July 27, 2018
Cloud Backup vs. Local Backup: Which is The Better Option? screenshot

Cloud Backup vs. Local Backup: Which is The Better Option?

Over the last couple of decades, computers have completely outgrown their initial function as an exclusive tool for complex scientific research, and have long moved past the status of eccentric oddity to enter the...

Read more
July 27, 2018
Be Careful with the Links in Your Inbox, Even If You Think That They Can Be Trusted screenshot

Be Careful with the Links in Your Inbox, Even If You Think That They Can Be Trusted

'Humans are the weakest link' is one of the most clichéd phrases in information security circles, but it must be said that as a statement, it's 100% true. While it's easy to believe the Hollywood movies where breaking...

Read more
July 26, 2018
Will Fraudulent Activity Be Monitored on the Internet After the End of Net Neutrality? screenshot

Will Fraudulent Activity Be Monitored on the Internet After the End of Net Neutrality?

Net Neutrality. What is it exactly and how does it impact our day-to-day activities? Net Neutrality. You've all heard all the noise about net neutrality, but what is it, exactly? Well, it's a long, boring story, but...

Read more
July 26, 2018
A New Text Message Scam Targets PayPal Users in the UK screenshot

A New Text Message Scam Targets PayPal Users in the UK

Last week, we explained what smishing is and how it works. Today, we're going to see the attack in action, analyze it, and learn what we can do to avoid falling victim to it. Casting the net Reported by Tech.co, it...

Read more
July 25, 2018
What Is SamSam Ransomware and How to Protect Your Organization Against It screenshot

What Is SamSam Ransomware and How to Protect Your Organization Against It

SamSam is a ransomware family that's been around since 2015. It has all the classic characteristics for an operation of this sort: crooks sneak the malicious program into a Windows computer, encrypt the victim's...

Read more
July 25, 2018
What Is the Difference Between Password Protection and Password Encryption? screenshot

What Is the Difference Between Password Protection and Password Encryption?

We often talk about how to protect user's email, social media accounts, and so on, but what about text documents and other files we might store on our devices? If you have ever asked yourself what is the best way to...

Read more
July 25, 2018
Seven Types of Data Breaches in 2018: Phishing, Malware and Others screenshot

Seven Types of Data Breaches in 2018: Phishing, Malware and Others

What is the first thing you think about when you think “data breach?” Maybe you immediately imagine someone using malware to invade your virtual privacy and steal personal information? Although that is, in large part,...

Read more
July 25, 2018
How to Completely Wipe All Data From Your Android Smartphone screenshot

How to Completely Wipe All Data From Your Android Smartphone

Smartphones changing hands is hardly an uncommon occurrence nowadays – you buy a new one and the old one ends up in the hands of a sibling or parent, or sold to a second hand vendor somewhere. After all, there's no...

Read more
July 24, 2018
How Do You Know If You're Using a Pwned Password? screenshot

How Do You Know If You're Using a Pwned Password?

Users still use weak passwords despite specialists’ efforts to enlighten them on the importance of setting secure digital locks for all their accounts, so there is nothing surprising that the password hacking rate has...

Read more
July 24, 2018
Is Cyclonis Password Manager a Password Encryption Tool? screenshot

Is Cyclonis Password Manager a Password Encryption Tool?

With the growing online security requirements, quite a few corporate and individual users turn to password encryption in order to protect their sensitive information. Normally, passwords that are stored within a...

Read more
July 24, 2018
Hackers Compromise Personal Data of 1.5 Million Singaporeans, Including the Country's Prime Minister screenshot

Hackers Compromise Personal Data of 1.5 Million Singaporeans, Including the Country's Prime Minister

Think that you're immune to cyberattacks and identity theft attempts because you know how to protect yourself? Think again. Take Lee Hsien Loong, Singapore's Prime Minister, as an example. We can only assume (and...

Read more
July 24, 2018
Five Privacy-Related Settings to Make Windows 10 More Secure screenshot

Five Privacy-Related Settings to Make Windows 10 More Secure

There's no question that it took a long time for people to accept Windows 10. Gamers were among the first to make the jump because of the graphical boost by the latest DirectX versions and because many newer games...

Read more
July 24, 2018
Simple Ways to Backup Google Authenticator on Your iPhone screenshot

Simple Ways to Backup Google Authenticator on Your iPhone

If you have ever read some of our previous articles on the subject then you must know by now that I am a strong proponent of two-factor authentication (2FA). It adds an extra layer of protection to your accounts,...

Read more
July 23, 2018
How To Know If Your Email Has Been Pwned? screenshot

How To Know If Your Email Has Been Pwned?

According to the Breach Level Index, over 4 million records are lost or stolen every day. Therefore, it is not a surprise potential victims of data breaches are looking for ways to check whether their emails,...

Read more
July 23, 2018
1 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 46