Posts

Security tips to Avoid Virus /Trojan/ Key-logger Infection

Image
1. Install a good antivirus. Free or Paid is good, but don't used cracked or pirated versions. 2. Install real-time anti-spyware protection 3. Update your Anti-virus programs daily. 4. Perform scans on your computer daily. 5. Disable image previews if using Outlook 6. Disable auto-run to prevent infection from pen-drives. 7. Use good anti-virus which has browser plugins and scans all URL's for malicious content. 8. Don't click on any mail links or attachments from unknown sources or malicious users. 9. Never download software from third-party sites. Download from original website. Don't use cracks or keygen which may be a virus/trojan itself.

‪#‎Password‬, SMS stealing ‪#‎virus‬ hits ‪#‎Android‬ phones.

Image
‪#‎ NEWDELHI‬ : Cyber  ‪#‎ security‬  sleuths have alerted Android-based smart phone users against an infectious Trojan virus which steals vital information from the personal device and can even illegally send SMSes to those on the mobile contact list. The deadly virus has been identified as 'AndroidSmssend' and it can acquire as many as four aliases to hoodwink the user and perpetrate its destructive activities on a p ersonal Android enabled phone. "Android/SmsSend is a premium service abuser family malware that arrives bundled with legitimate Android applications and infects Android based smart phones. "Once infected, it sends text messages (typically with a link to itself or a different threat) to a specific number, typically to numbers on the contact list and is also capable to send SMS to premium rate numbers," the Computer Emergency Response Team of India (CERT-In) said in its latest advisory to Android phone users in the country. The CERT-In i...

Difference USB 2.0 and USB 3.0

Image
Image

‪HP‬ Introduce X2210 Detachable ‪ ‎PC‬ ‪ ‎Tablets‬.

Image
System features:- Operating system Windows 10 Pro 64 1 Windows 10 Home 64 1 Windows 10 Pro 64 (National Academic only) 1 Processor family Intel® Atom™ x5 processor 2 Processor Intel® Atom® x5-Z8300 with Intel HD Graphics (1.44 GHz, up to 1.84 GHz using Intel Burst Technology, 2 MB cache, 4 cores) 2 Chipset Chipset is integrated with processor Environmental Low halogen 12 Dimensions and weight:- Dimensions (W x D x H) 264 x 173 x 9.65 mm (tablet); 264 x 182.6 x 19.84 mm (tablet with keyboard) Weight Starting at 598 g (tablet); Starting at 1139 g (tablet and keyboard) (Weight will vary by configuration.) Memory:- Maximum memory 2 GB LPDDR3-1600 SDRAM; 4 GB LPDDR3-1600 SDRAM (Transfer rates up to 1600 MT/s. Onboard memory not customer accessible/upgradeable. ) Storage:- Internal drive 32 GB or 64 GB eMMC 3 Display and graphics:- Display 10.1" diagonal WXGA anti-glare WLED eDP ultra-slim with capacitive multi-touch screen (1280 x 800) 7 Expa...

Ad Fraud Malware Updating Flash on Infected PCs

Image
Ad fraud malware is one of the more profitable specialties in the cybercrime world, and the attackers who use it often have to adapt their tactics in order to keep the money rolling in. One of the tactics that they have adopted in recent months is that of updating the version of Flash that’s installed on an infected machine. This technique is not something unique to ad fraud malware. Attackers have been known to patch the vulnerabilities they exploited to get on to a given machine as a way to keep other hackers out and some malware strains have been seen doing this, too. But the motivation for doing this likely is somewhat different for criminals using ad fraud malware. In their case, they’re not so much interested in the cleanliness of the machine as they are in the ads a user sees being displayed correctly. That’s where the move to update Flash comes in. Flash is required to play many video ads in browsers, and most modern browsers won’t run Flash content if the version that’s in...

Future technologies.

Image