Category: Antivirus

  • Heartbleed Bug – Effects and Discovery

    Heartbleed Bug – Effects and Discovery

    Like the Shellschock bash bug, the Heatbleed bug is yet anotherdeep-seated, serious vulnerability.  This time it is found in the OpenSSL cryptographic software library, an open-source security protocol that is used in about two-thirds of Web servers.   In short, the data or information that is normally protected by the SSL/TLS encryption can now be…

  • Creepware – Definition, Samples and Prevention

    Creepware – Definition, Samples and Prevention

    Cyber-voyeurs or what we can simply call ‘digital peeping toms’ have the ability to snoop around on your personal affairs and business like:   Remotely accessing your webcam and capture images of you or anything within the span of vision of your computer’s camera. Listen to any conversations using your computer’s microphone. Monitor your online…

  • 7 Tips in Keeping your Digital Life Safe

    7 Tips in Keeping your Digital Life Safe

    When the giant techs like Apple, Microsoft and eBay had become victims of hackers, ordinary people like us are also alerted.  These titans have cutting edge hard-bolt security which may be the best in the field of security and protection… and us? Oh, we poor mundane netizens really have something to worry about really.  …

  • How Are Malware’s being Controlled from the Cloud?

    How Are Malware’s being Controlled from the Cloud?

    Criminals are not only of the physical world but also manifest their presence in the digital world.  According to the security firm, Trend Micro, evidences about propagation of malwares have been discovered.  These are also being controlled remotely from cloud servers, making netizens vulnerable if they don’t make necessary measures.   Many individuals make their…

  • Shellshock Bash Bug – Description and Prevention

    Shellshock Bash Bug – Description and Prevention

    Shellshock is another deep-seated security bug that seriously threatens any network device.  Experts have learnt about an anomaly in Unix command shell (or bash) found in Linux and Mac devices that enables attackers to run any code upon the execution of shell.  The shell—also known as command prompt—is a software application that enables a system…