SC Security July 2016 Bulletin-1

All sorts of news are making the headlines. Brexit, US Presidential elections, Olympics and gun fire, to name a few. All of these social events have widespread effects in the digital media especially in internet security. Here are some of the highlights for the month of July. Phishing scam targets Brexit situation. 80,000 Login Credentials Leaked as Amazon Ignored Warni...
Read More

5 Signs That You May Have Received A Phishing Email

Ever wondered why you get so many junk emails? Nowadays it's more than just junk, they are deliberate attacks and the word is 'Phishing'. We all are vulnerable and that is why we get them. Here are 5 Signs to look out for when these low life scums send us an email: Spoofed, Random and Arbitrary Email Addresses. Phony "From" address  Look at the 'From' address. If thi...
Read More

Security Questions – Technique of Misleading Answers

Q: If I have it, I don’t share it. If I share it, I don’t have it. What is it? A: A Secret. When you sign up for a new account, you are required to fill the Question & Answer section for the purpose of resetting, unlocking, regaining access etc to your account. Most times, we just fill it out with zero thought and when we forget our passwords or our account's locked out...
Read More

Creating Unique Passwords

Are you tired of remembering passwords? Do you have to change your password due to a recent change in password complexity requirements? Then you are in the right place. We learned that a strong password goes a long way in our updated Password Post 'My New Password Is…' Make sure you get familiar with passwords and how to set a strong password. When you think you have a password...
Read More

Understanding the Threat – Breaches

A data breach is the intentional or unintentional release of secure information to an untrusted environment. Other terms for this phenomenon include unintentional information disclosure, data leak and also data spill. Incidents range from concerted attack by black hats with the backing of organized crime or national governments to careless disposal of used computer equipment or...
Read More

Can You Breach This? 3 Steps To Boost Your Security

There are lot of things on the internet we are grateful for, social community, sharing knowledge, communicating with your peers, making a living, entertainment and the list is never ending. All of these services come with a risk. We are going to look at the risk of breach of services or websites and most importantly your username and passwords. Can you breach this? Moreover, ca...
Read More

My New Password is…

Superman Picks Green Car. We will come back to this picture at the end of the article, but just keep that in your mind somewhere, will you? Thank you. Back in 2015, Jimmy Kimmel of ABC sent a camera out onto Hollywood Boulevard to help people by asking them to tell us their password and 4 out of 5 blurted their passwords and were very candid about it. Some showed pride in...
Read More

5 Steps to be Malware / Spyware / Virus / Cryptolocker Free

So your computer got infected? Read this post for removing most infections and if you still are not sure and want to get rid of an infection or you suspect an infection, here are 5 Steps to clean up and prevention. Step 1 Preferably using a second computer, download the following programs into a USB thumb drive. Step 2 Run the programs / ...
Read More

How do you know everything about me? Oh, Its only you! Are you?

The title of this post has both a sense of friendliness and hostility. A man and a women meet in a restaurant and hit it off. Most consider this normal and thus the conversation continues. All is well there and whatever happens of that conversation is out of scope in this discussion. What is important is to remember that one had this conversation. Several days later, you bump i...
Read More

Anti-Malwares

Suspect that your computer is infected with a Malware? There are couple of really solid Anti-Malware programs you can run to scan and remove these types of threats. Click below to open the download page from the main site. Download Malwarebytes The best disinfection and protection solutions to combat the world's most harmful Internet threats. Download Malwarebytes ...
Read More