Posted by cyber-geek | Posted in Cyber tips | Posted on 13-04-2011
The Internet today is filled with huge amount of malware activities and one small mistake can make you fall prey to them. These mistakes often end up in infection of the PC or exploit online accounts (bank accounts, credit cards, etc.) of the user. The activities you need to avoid online are as follows:
Not dealing seriously with passwords
Everyone knows that passwords are important. Yet… Continue reading
Posted by cyber-geek | Posted in Secure Downloading | Posted on 11-12-2009
Now-a-days cyber criminals are using popular events, current developments and even movie premieres to attract people who seek free or pirated content and exploiting.
A recent online scam which promises viewers to download the recent “Twilight – New Moon” movie is found to install malware in PCs.
The entire process of this scam is as follows…
Posted by cyber-geek | Posted in Cyber tips | Posted on 30-10-2009
With the increase of online banking, online e-mail, online purchases, etc., there is a need for increased password security. If you are like many people who use the same password for most sites, you are in trouble if your password gets hacked. You need to make your passwords complex and tough to crack and create a separate password for each account. Once you create a different complex password… Continue reading
Posted by cyber-geek | Posted in Cyber tips, Secure Downloading | Posted on 16-10-2009
Mozilla Firefox is a popular browser used by millions of Internet users all around the world. The coolest feature of Mozilla Firefox is its compatibility to add more and more plugins and enable yourself with advanced browsing.
However, we need to update our plugins as soon as a new version is available. Updates of these plugins will not only cover new features of the plugin, but… Continue reading
The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication is known as Phishing.
Types of Phishing
Phishing is usually carried out by email or instant messaging and it often directs users to enter details at a fake website, which is similar to the legitimate one… Continue reading
McAfee says that searching for Yuvraj and Aishwarya in the cyberspace can damage one’s PC. The research from McAfee on India’s glamorous celebrities from the world of cinema, cricket and politics to reveal the most risky celebrities on the web, has rated Yuvraj and Aishwarya on top.
Fans searching for ‘Yuvaraj Singh wallpapers’, ‘Yuvraj Singh downloads’, ‘Yuvraj