Guidelines To Making Secure Passwords

How Secure is your password

A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access. Passwords are the first line of defense against cyber criminals.…

Read More

What is Signal

Signal Mobile Phone App

Signal is a free all-in-one messaging and voice-call solution that uses end-to-end encryption. Its developed by Open Whisper Systems and the App is available both on Android and Apple’s iOS. Their is also a desktop version for Linux, Windows and macOS. Signal is greatly known for its fantastic messaging solution for security-conscious mobile users. Despite its renowned…

Read More

Protect your machine from Meltdown and Spectre

Meltdown and Spectre malware caused havoc among many users

  The information technology security woke up to year 2018 with the discovery of Meltdown and Spectre. Meltdown and Spectre is a vulnerability that was discovered in the PC Intel and Qualcomm powered processors and Spectre on billions of devices running on ARM, AMD and Qualcomm processors.   In the wake of the festive holidays…

Read More

10 Million Passwords and Usernames Published Online

Check if your email is compromised or pawned

In the name of clarity and research, a security expert has compiled and published 10 million usable usernames and passwords online. Reports ZDNET. Mark Burnett is a security consultant and researcher who specializes in the security of Microsoft Windows-based servers and networks. Apparently, the dump file is interesting! One sees a pattern of a varied users’ choice of…

Read More

How To Protect Your Android Based Device from Malware

Android tablet device

Cyber-criminals, with its underground activities, are ever more dangerous, keen and merely urged toward sophistication. Cyber criminals are organised into commercial units your unprotected Android device will swipe so easily as a step to steal your personal information. This rise has soured because of the rate of adoption of mobile devices. And criminals have validated…

Read More