Hiển thị các bài đăng có nhãn Security Tips. Hiển thị tất cả bài đăng
Hiển thị các bài đăng có nhãn Security Tips. Hiển thị tất cả bài đăng
How to enable Two-Factor authentication in Linkedin?

How to enable Two-Factor authentication in Linkedin?


I'm very glad to hear the Linkedin is the latest company that boosts the security with the Two-Factor authentication. Few days back, Twitter enabled the two-step verification to thwart hackers.

Are you searching for the guide to configure the 2-step authentication? You are at right place.  Here is the guide that will help you to configure the linkedin two-step verification .

Before getting
10 System Admin Tools to Help You Secure Your Network

10 System Admin Tools to Help You Secure Your Network




System admins are frequently bombarded with security concerns, requests, alerts, news items, “did you see this?!” emails, and more. Keeping up with all the aspects of network security can seem like an overwhelming task, but in this post we’re going to look at ten tools a system admin can use to help secure their network. Some you may be familiar with, like network security software, while
Blackhat SEO poisoning attacks

Blackhat SEO poisoning attacks



Recently , i have reported that Google Image search and Bing Image search leads to malware sites especially a blackhole exploit kit page. The reason behind this attack is SEO Poisoning.

What is SEO?
Search engine optimization (SEO) is a collection of techniques to improve the visibility of a website in a search engine's search results. Some of the techniques used by webmasters in

What is
6 Web Security Risks of Not Monitoring Internet Activity

6 Web Security Risks of Not Monitoring Internet Activity







Internet access is one of the most important things you can provide to your users. It’s a morale booster, it helps them do their job (for some it is even a vital component of their job,) it enables them to find solutions to problems, research the competition, find new customers, and more. But Internet access comes with a host of threats and if you are not on top of your web security game,
[Security Tips] How to Secure iOS Devices ?

[Security Tips] How to Secure iOS Devices ?





Kaspersky’s ThreatPost has released an interesting video that’s meant to educate the owners of iOS devices on how to properly secure them.

"Considering the rapid proliferation of smartpones and tablets and the vast wealth of personal and financial data many of us store on them, it is increasingly important that we find ways of securing our mobile devices. With that in mind, we decided there
List of websites to check whether website is safe to use or not

List of websites to check whether website is safe to use or not


In one of my posts, i explained how to check a website is safe or not using McAfee siteAdvisor add on.  But ,checking with one site is not enough.  To make sure whether site is free from malware or not, we have to verify the target-link with few more sites.

Here ,i list out some websites that helpful to identify whether site is safe or not :

1.MyWot:WOT is a community-based, free safe surfing
How to protect your cloud storage from hacking?

How to protect your cloud storage from hacking?

The concept of cloud storage has become more common these days especially when offered commercially since it's more cost effective for a large corporation to store data on an off-site data center. It is cheaper and they don't have to worry about finding space for storing data on server which can be the size of a warehouse. However, at individual level, it is preferred less over local storage
7 Things You Should Know About Online Passwords

7 Things You Should Know About Online Passwords


As online technology has advanced, so have hackers techniques for getting into your accounts and stealing personal information. Hackers break into computers 2,244 times each day by figuring out weak usernames or passwords, according to University of Maryland data. If you’re still using the same password you made up when you opened your first email account, you are setting yourself up to be a
The Top 5 Subjects(Tricks) used by Malicious Spammers

The Top 5 Subjects(Tricks) used by Malicious Spammers

According to the research of websense,, these are the top 5 Subjects used by Malicious Spammers. If you an email with the following subject or similar tricks, Don't click the links or download the Attachment, if you do, you will end up in malware attack.

1.ORDERS Order N21560 (numbers vary)
This link redirects to .ru/main.php or .com/main.php URL, which serves the Blackhole exploit kit. These
5 Basic Mobile Security Tips to avoid Dangerous Application ,McAfee

5 Basic Mobile Security Tips to avoid Dangerous Application ,McAfee


Now a days, attackers targets smart phones rather than the Desktop.  The number of malware application for mobile is increasing.  Infected mobile can be used to steal confidential data or  send out expensive text messages without a user’s consent.


Some Top tricks used by attackers:
Malicious apps are usually offered for free and being disguised as fun applications such as games, calendar and
Shield Against Hacking With a Daily Anti-Malware Scan

Shield Against Hacking With a Daily Anti-Malware Scan



Hacking; it's the fear of every website owner and it keeps many online business owners up at night, checking their website and servers, making sure they are still in control. It's scary, one day you are doing well and selling products, the next, you can't log into your website, you have profane images instead of product images, and you are being a virus spreader that most search engines block
3 Basic Ways to Tell Your Computer Has Been Hacked

3 Basic Ways to Tell Your Computer Has Been Hacked

Learning how to hack into the accounts of individuals is really convenient and pretty cool—but when the tables get turned around and you become the "hackee"—yeah, not so cool anymore. Thankfully there are some clues that may suggest you are the victim of being hacked. To learn what they are, continue reading below.

1. It Seems as Though a Ghost Lives Inside Your Computer. If you start noticing
Find If A Website Is safe To Open or not using Online sites and Tools

Find If A Website Is safe To Open or not using Online sites and Tools


In last post, we explained how to check if the site is safe or not using the McAfee Advisor.  Now i am going to introduce some other sites and tools for testing the site is safe to open or not.

Websites To check sites:Norton Safeweb:
Norton Safeweb is free online application provided by Norton Security. It works same in way as McAfeeAdvisor.
You can check the site safety here:
http://
How to check if a website is safe to use or not? | McAfee SiteAdvisor

How to check if a website is safe to use or not? | McAfee SiteAdvisor

Cyber world is most risky world.  Here you may not know you are being attacked until your system completely destroyed or your data stolen.

if you trust whatever you website you see in Internet, then your data and system are in risk.  Website can spread malwares , this malware can infect your system without your knowledge.  In order to get protection from those sites, we have to identify harmful
How to Hide email address when sending mail to Multiple Recipients

How to Hide email address when sending mail to Multiple Recipients

Recently, i got mail from my Institute(where i learned Java) regarding the Interview. when i look into the To address, it includes other email address (including girls email address).  This is not big matter when you send mail within organization. What if suppose you send to others.

Just for fun:Just imagine you have two girl friends.  Forwarding some interesting mail to both.  If anyone notice
Could Your Bad Password Habits Come Back To Haunt You?

Could Your Bad Password Habits Come Back To Haunt You?


According to Business Insider, the CEO of a major social network used its trusted database of user passwords in order to hack into one of its user’s email accounts. The hack was based on the guess that this user probably accessed all of their accounts using the same password.

Although the cloud has provided us with some amazing new tools, it’s also created the need for increased end-user