Loading page

Microsoft Is Banning Stupid Passwords

There’s a big problem with passwords, and it’s all down to the people who set them up in the first place. There are plenty of idiots who can never remember their passwords, and just use something so hilariously obvious they probably shouldn’t even have bothered. Microsoft is taking measure to put an end to that.

Be Careful When You Copy And Paste Code From The Internet

The internet is full of free resources and there are plenty of websites out there offering sample codes like Stack Overflow that programmers and developers can use to perform various tasks for computer programming. But a web consultant has pointed out that this common practice could be a security risk. Here are the details.

Six Steps To Creating A Strong Password [Infographic]

Passwords are a pain in the neck to make up. It’s easy to fall into the trap of using words that are just easy for you to remember. But that, in turn, makes them easy to guess and potentially exploited by cybercriminals. Security firm ESET has released a visual guide to help you with creating a password that is more secure than “123456”.

25% Of WordPress Security Holes Thanks To Just 3 Add-Ons

WordPress is arguably the most prevalent of content management systems on the web today so, unsurprisingly, it’s a massive target for malicious activities. While the core WordPress package has had its share of security issues, it’s outdated plugins that are a major contributor, with three in particular comprising 25 per cent of all WordPress vulnerabilities.

ESET Launches Free TeslaCrypt Decryptor For Ransomware Victims

The TeslaCrypt ransomware has been a popular choice for cybercriminals since it was launched in early 2015. But in a surprising turn of events, the people behind the ransomware has unveiled the master decryption key for TeslaCrypt. Security vendor ESET has used that key to develop a decryptor tool for TeslaCrypt and has made it free to the public. Here are the details.

Here Are Some New And Improved Ransomware Variants Out In The Wild

By now, you should be very familiar with ransomware and just how prevalent they are on the internet. It’s a global problem but Australia has become a popular target for this kind of cyberattack which can hold computers to ransom. While the IT security industry is constantly finding new ways to combat this type of threat, cybercriminals are just as quick in developing new varieties of ransomware to evade detection and mitigation. Here are a few new and interesting strains of ransomware that have been spotted by security vendor FireEye.

What To Use To Protect Your PC When Commercial Antivirus Offerings Fail

It has recently come to light that nearly all Symantec antivirus products are vulnerable to remote code execution that could give attackers root access to computers. The reason why this bug is particularly nasty is because it affects Symantec’s antivirus engine which is embedded into the Windows kernel, giving it the ability to cripple computer systems. Symantec isn’t the only antivirus vendor that has experienced serious security flaws but it does beg the question: how should you protect yourself when you can’t rely on commercial antivirus products? Read on to find out more.

5 Reasons You Need A PO Box

As the world becomes more digital, your physical address is more important than ever. Your address is shared more, it’s more discoverable, and it’s also very valuable. These are just some of the reasons why you should consider investing in a PO Box.

Vulnerabilities In 7-Zip Could Affect 'Many Products And Appliances'

Your average user doesn’t pay much attention to security vulnerabilities in software, but when they affect something like 7-Zip, one of the most popular compression tools available, it has a way of cornering the raised eyebrow market.

Microsoft Patches A Number Of Critical Vulnerabilities For Windows OS, Office and Browsers

In the latest Microsoft Security Bulletin, the vendor has issued patches for 16 security bugs for its software of which eight are rated as critical. Some of them affect all supported Windows operating systems including Vista, Windows 7, 8, 8.1 and 10. Among the critical security flaws found, a handful involved remote code execution which would allow hackers to take over vulnerable PCs. Here are the details.

Loading page