skip to main | skip to sidebar

TechsVilla

HOUSE OF TECH FOR ZEALERS

  • TECH
  • GAME
  • BLOG
  • WINDOW
  • LINUX
  • APPLE
  • SECURE
  • MSN
  • TIPS
  • CYBER SECURITY


    The Only Secure Password Is the One You Can’t Remember

    Let's assume you log onto a bunch of different websites; Facebook, Gmail, eBay, PayPal, probably some banking, maybe a few discussion forums, and probably much, much more. Consider a couple of questions:

    1. Do you always create unique passwords such that you never use the same one twice? Ever?
    2. Do your passwords always use different character types such as uppercase and lowercase letters, numbers and punctuation? Are they "strong"?                                                                                                 read more

     

    Honeywell’s Home Automation Touchscreen: Security Optional

    New 6280 'graphical keypad' to feature WiFi, Z-Wave and Honeywell security sensor protocol; built-in Web server enables remote access to cameras, security, thermostats, lights, locks and more.
    Honeywell isn't just for security anymore. At the Electronic House Expo last week, the company unveiled a home automation system -- security optional.                                        read more

     

     

    Anonymous Exposed: Hacker Group Infiltrated, Chat Logs Leaked


    anonymouslogo.png
    ​Late last week Gawker posted a story outing correspondence between users thought to be "leadership" members of the internet hacker and activist group Anonymous, one previously referred to in the press as non-hierarchical. In the chat logs, a clear chief can be seen giving orders to his fellow "anons" as the small group takes credit for hacking the emails of computer security firm HBGary and ravaging the security of Gawker.com back in December. The chat logs have since been revealed.........                                                                   read more
    Expert: RSA security breach compromised key federal networks 
    A product many federal employees use to log on to computers and networks should be regarded as compromised, due to the infiltration of key information about the application during a cyberattack against manufacturer RSA, some security experts said.                                                 read more

    Mobile security moving to the forefront?
    Extending central station monitoring beyond the home
    MobileTREC solutions work with both smartphones and traditional mobile phones and address a 2010 call to action from the FCC. After the Virginia Tech shootings—during which students allegedly.......                                                      read more



    Local ethical hackers nurtured in Kenya

    EC-Council, leaders in information security training and education in conjunction with SIMOS Consultancy Services launched a network security product to deter hackers' from infiltrating information systems.         read more


    Malware exploding, especially on mobile devices

    Two reports find malware growth in the double digits. Mobile devices are the latest favorite cyber crime target says McAfee.Mobile malware is soaring and Adobe is the main vector of attack, according to new figures from security firm McAfee that were issued Tuesday.                                               read more


    Facebook is biggest mobile malware threat, says security firm

    Researcher claims bad links on Facebook responsible for much higher infection rate that targeted mobile malware.The biggest mobile infection threat isn't malware that specifically targets mobile devices....                        read more


    3 reasons trustworthy sites can no longer be trusted

    Research from Blue Coat Systems claims cybercriminals have shifted their malware-delivery technique from the internet's shadier sites and are hacking the domains we visit every day

    Last year, malware became increasingly more                                                               read more

    9 Dirty Tricks: Social Engineers' Favorite Pick-Up Lines

    Congrats on your inheritance! Okay, you knew that one's the start of a scam. Here are other come-ons you'll encounter when criminals come knocking

    What the average guy might call a con is known in the security world as social engineering. Social engineering is the criminal art of scamming a person into doing something or divulging sensitive information. These days, there are thousands of ways for con artists to pull off their tricks (See: Social Engineering: Eight Common Tactics). Here we look at some of the most common lines these people are using to fool their victims..             read more

    Social Media Risks: The Basics

    Social media sites unfortunately pose many security risks for the unwary. Here's a guide to avoiding scams of all sorts.

    You may be a champ at Mafia Wars and Farmville, but what do you know about the security risks of social media sites?                                        read more





     


    Email This BlogThis! Share to X Share to Facebook
    Home
    Subscribe to: Comments (Atom)
    Powered by Blogger.
    • Home
    • TWEAK PC
    • MICROSOFT NEWS
    • CYBER SECURITY
    • APPLE
    • LINUX
    • WINDOWS
    • WEB DESIGNING
    • GAMING
    • TECHVISION

    TechsVilla Corner

    Loading...

    Blog Archive

    • ▼  2011 (156)
      • ▼  April (5)
        • Sony Ericsson Xperia Play review
        • Responsive web design
        • Wireframe tools: the top 10 solutions
        • Actually A Fantastic Idea: Hasbro’s My3DNow 3D iPh...
        • Google Wants To Make Your Face Searchable (Updated)
      • ►  March (151)

    Popular Posts Widget

    • SPIDER-MAN: SHATTERED DIMENSIONS
      RATINGS 4/5 Action Spider-Man: Shattered Dimensions Price       Rs 3,499 (PS3) PUBLISHER          Activision DEVELOPER         Beenox PLA...
    • Web fonts: the .net top 20
      Web fonts: the .net top 20 It’s easier than ever to get creative with typefaces. Elliot Jay Stocks picks 20 web fonts that demand your vis...
    • Mac OS X 10.7 Lion: what you need to know
      Steve Jobs and other senior Apple employees provided   a glimpse   into Mac OS X 10.7 'Lion', making clear Apple's philosophy re...
    • Wireframe tools: the top 10 solutions
      Create your next prototype the easy way with our guide to the best wireframing tools out there Every website design has to ki...
    • PC won't boot up? How to find out why it so....
      You press the power button and your PC won't boot up. What do you do next? Don't write it off just yet. The first thing to do when ...

    Total Pageviews

    Subscribe To

    Posts
    Atom
    Posts
    All Comments
    Atom
    All Comments

    About Me

    Rajan Chatterjee
    I m Student Of computer Scince Engineering and tech-savvy person have unlimit zeal for programming and technology
    View my complete profile

    Followers

    Copyright © 2010 TechsVilla | Blogger Templates by Splashy Templates
    Css Designed by Hot Website Templates