How to Prevent Mobile Malware

How to prevent mobile 'Malware'

Malware is short for Malicious softWare, which is designed to damage or even disrupt the computer. The array of malware ranges from spyware to key loggers; some are for financial malware and includes ransomware. Protection against Malware is ‘anti-malware’ products in the simplistic terms, and there we have it.  Not much of an article though …

Read moreHow to Prevent Mobile Malware

A parental guide to cyber bullying, and just bullying

Cyber bullying or just bullying

Bullying is just that; it’s only in more recent years that ‘cyber bullying’ has become prevalent. Bullying is bullying, irrespective of age it’s been in society for as long as you wish to consider. But it does leave a nasty taste in your mouth! No parent wishes to learn that their child is being bullied, …

Read moreA parental guide to cyber bullying, and just bullying

Darkest web – TOR and THS (Tor Hidden Services)

Darkest web

As part of my ongoing research on the internet, its content and the varied ways that people will go to. In itself is a reflection of how humanity has reached the depths of depravity for their own gratification. Of the many feeds that I receive, one in particular from Cyber Security Intelligence known as CS …

Read moreDarkest web – TOR and THS (Tor Hidden Services)

How to Secure Your Computer or Laptop

secure computer laptop

No doubt, computer has become an essential part of our daily lives. You get almost everything done online (or wish to do even when can’t) via your computer or laptop these days, and that’s perfectly fine – without computers it’d be silly to think living in this age. Now, alongside a number of advantages we’re …

Read moreHow to Secure Your Computer or Laptop

What is Dark Web, how to access it and what’s the difference between Dark and Deep Web?

What is the Dark Web

Three “deep” questions you may wish to ponder yourself on, what are these and maybe what is the relationship? For me, something dark always conjures up the sinister.  Just like Pink Floyds ‘Dark side of the moon’, though great music but your imagination can conjure Earth being under threat! (But what is on the dark …

Read moreWhat is Dark Web, how to access it and what’s the difference between Dark and Deep Web?

Secure communication with ultimate tips from experts

Keeping online communication private

Given the explosion and pace of technology, ensuring your privacy is underlined by integrity could make you feel ‘paranoid’. However what’s paramount here, it’s your ‘right’ to have privacy, and it’s your entitlement. The question is, how can you fully secure communication online? The key aspects are those of ‘Ownership’ and ‘Risk’; both are yours …

Read moreSecure communication with ultimate tips from experts

10 best SSL certificate providers

Top 10 Of SSL Certifications Available

You are on lookup of the top SSL providers, right? Well, I surely will get you there but let’s cover some basics together first. So, what does the acronym SSL stand for? SSL means Secure Socket Layering, even though SSL has been superseded by Transport Layer Security, the function is commonly known as ‘SSL‘. In …

Read more10 best SSL certificate providers

LinkedIn scams to look out and how to avoid them

Scamming on Linked

Long before we had the internet and email, and the word ‘Scam’ came into use, we weren’t  aware of what it was known then. Certainly going back many years in the UK (as well in many countries around the globe), they were referred to as the ‘wide boys,’ out to rip off anyone, irrespective of …

Read moreLinkedIn scams to look out and how to avoid them

10 critical computer security changes that took place in last 10 years

computer security changes last 10 years

A strange way to start an article, with a quick precis on history, bear with me and all will be revealed… What does history tell us: Genghis Khan who live between 1162 – 18 August 1227 He united the monadic tribes of Northeast Asia, founding the ‘Mongol’ empire and proclaimed as “Genghis Khan”. He conquered most …

Read more10 critical computer security changes that took place in last 10 years

Ways how one can get arrested while using the Internet

20 Ways One Can Get Arrested While Using the Internet

Considering the title for this article, it evokes many ways this could be possible. However, as with all articles, you need a starting point, so I’ve used the links below to instigate my research. So without further ado, let’s get cracking on with the task that what are those things one might be doing over …

Read moreWays how one can get arrested while using the Internet