Ivy May 10, 2014 No Comments
Decoding Cloud Computing
This month we focus on cloud computing and cloud analytics – a core functionality for every enterprise-wide solution. With SMAC (social, mobile, analytics, cloud) fast becoming a chosen technology for small to large enterprises, it has become necessary for pro
Ivy Jan 11, 2014 No Comments
Is there an unauthorized payment transaction to a vendor?
Does a suspicious amendment to banking details show up in payroll or supplier data records?
Can weakness within the client system be identified to prevent fraud recurrence?
How to detect SIM card cloning?
With increase in the use of net, mobile, IVRS (Interactive Voice Response System), ATM, commercia
puja Jun 09, 2010 No Comments
You work hard every day to make a living and support yourself and/or your family. If you’ve read the HowStuffWorks credit report and credit score articles, then you know how to keep your credit clean so you can enjoy the benefits of all of that hard work. What happens, thoug
puja Jun 03, 2010 No Comments
Protect Urself !
Follow These Simple Guidelines n u are done
*** Under the security option tab of Mozilla Firefox there is an option Show Passwords make sure its protected by the master password.
1. U may avoid using Internet Explorer(old versions) and make the switch to Opera, it’s more se
Spam Prats Feb 09, 2010 No Comments
If you remember the Star Wars movies, there were two sides of the Force. The light side and the dark side. In the world of hacking, ethical hacking is considered the light side of hacking. Why?
Because ethical hackers use their skills and abilities for a constructive matter. Their intention is to offer adequate protection to their clients and assure them
Spam Prats Feb 02, 2010 No Comments
Spanish Prime Minister’s picture changed with one of Mr. Bean
Unidentified hackers have defaced the website of the European Union Presidency assumed by Spain at the beginning of this month. The picture of Jose Luis Rodriguez Zapatero, Spain’s Prime Minister, was replaced with one depicting Mr. Bean, a world-renow
Spam Prats Jan 28, 2010 No Comments
After contaminating the search results on major search engines such as Google and Bing, search engine optimisation (SEO) poisoning is set to pose a threat to small and medium enterprises (SMEs).
SEO poisoning is a technique used by malware authors to mix rogue search results with legitimate ones. This attack, coupled with news it
Spam Prats Jan 28, 2010 No Comments
“Carry out all my demands or the entire country’s electricity will be cut off.” Is this another line from a suspense film, or is it a palpable threat made possible with a computer keyboard? “Today, there is a growing trend amongst hackers around the world to threaten national infrastructures for ransom,” says Dr. Yaniv Levyatan, an expert in information war at the U
Spam Prats Jan 21, 2010 No Comments
LONDON: Chinese hackers have tried to penetrate computers in the offices of national security adviser MK Narayanan, a British paper on Monday quoted him as saying.
Narayanan said his office and other government departments were targeted on Dec 15, the same date that US defence, finance and technology companies, including Google,
Spam Prats Jan 21, 2010 No Comments
A new spam campaign using false e-mails made to look like messages from the Social Security Administration is capable of stealing Social Security numbers and downloading malware onto victims’ home computers, says Gary Warner, director of computer forensics at the University of Alabama at Birmingham (UAB).
The campaign was discove