When you were a kid, presuming that you have indeed grown up, did you ever play the game “Man in the Middle”? That is where two players play a game of catch with a large ball, but they must throw it over the head of a third player in the middle. The player in the middle wins...
PGP stands for Pretty Good Privacy which is a software package that is employed to encrypt data especially for files and emails. My idea of writing this article is to make people understand how PGP contributes in the general security as it will help them in making good decis...
Unlike their desktop/laptop rival Microsoft, Apple does not go out of its way to alert their user base that they are withdrawing support for a version of their Operating System. It just happens. The last security update for Mac OS X 10.6 (Snow Leopard) was released last Sept...
Worm Autoit AARF comes from the family of Trojan infection which has a long history with the development of computer. Trojan infection targets on all versions of Windows machines. There are no exceptions for computer users who use Windows systems. Trojan infection mainly use...
Definition of Win32 Vobfus xc Virus: Win32 Vobfus xc is a risky Trojan Virus which PC users should have removed from the target computer completely. The newly released Trojan horse is designed by cyber hackers to violate users’ privacy and compromise your security. It...
Owners of Bitcoins and fans of the virtual currency are reeling today on the news of the collapse of the largest Bitcoin exchange and a sharp decline in the value of Bitcoins on other exchanges. Trading has been halted on the Japanese site for more than a week, but now the s...
We have been very proud of the performance of Comodo Internet Security in the Matousec.com “Proactive Internet Security Challenge 64″ over the past year. It’s worth taking some time to explain why this matters. A great resource for Internet security pros ar...
Online shopping, online banking and general storage of personal information on personal computers have made consumers more vulnerable to identity theft than ever before. You now have to worry about hackers, spyware, and Trojan horse programs. With the right software, hackers...
The age of BYOD, where users want to use their favorite smartphone or tablet for work and connect to their companies network, has been a challenge for IT management. It was hard enough when each employee had a company desktop or laptop, but now you need to keep track of and...
The US military may be trained to dodge bullets and bombs, but now they are being targeted with bits and bytes in the ever expanding cyberwar. Microsoft has confirmed that flaws in their Internet Security 10 browser have been exploited to spread malware on web sites frequent...