Tips List
T2022_02 Avoid being Scammed This Valentines Day (14th February 2022)
With Valentine”s Day approaching, you can bet that con artists will try to prey on lovebirds across the world. Here is how to prevent a… . . . Read more

Date Publish: Feb 14th 22
T2022_01 Peer-to-Peer Botnet FitzFrog is Back (11th February 2022)
What is FitzFrog? FritzFrog is a sophisticated modular, multi-threaded and file-less P2P (peer-to-peer) botnet that has been actively infiltrating SSH . . . Read more

Date Publish: Feb 11th 22
T2021_22 Tip to protect against Log4j Exploitation (21st December 2021)
What is the Apache Log4j Vulnerability? A series of vulnerabilities were recently discovered in the popular Java-based logging library Log4j which res . . . Read more

Date Publish: Dec 21st 21
T2021_21 Risks of File Sharing (15th December 2021)
What is File Sharing? File sharing is the practice of using technology that allows internet users to share files that are on their individual devices. . . . Read more

Date Publish: Dec 15th 21
T2021_20 Understanding Software Patches and Updates (30th November 2021)
What are Software Patches and Updates? A software patch commonly known as a fix, is a small piece of software that addresses security vulnerabilities . . . Read more

Date Publish: Nov 30th 21
T2021_19 Importance of Backing Up Your Data (24th November 2021)
What is data back-up Backing up is the process of storing data on a secondary medium (file, hard drive, external hard drive, memory card, flash&hellip . . . Read more

Date Publish: Nov 24th 21
T2021_18 Ransomware Attacks Are Evolving & So Should Your Security Strategy (5th November 2021)
Ransomware is a growing problem for organizations around the world and its likely to get even worse. What started as a floppy disk-centered attack wit . . . Read more

Date Publish: Nov 5th 21
T2021_17 Cybersecurity and Electronic Devices (20th October 2021)
Why does cybersecurity extend beyond computers? Computers are more than just laptops and desktops they also extend to electronic devices like video ga . . . Read more

Date Publish: Oct 20th 21
T2021_16 Distributed Denial-of-Service Attacks (30th September 2021)
What is distributed denial-of-service attacks A Distributed Denial-of-Service Attack is a malicious attempt to disrupt the normal traffic of a server . . . Read more

Date Publish: Sep 30th 21
T2021_15 Denial-of-Service Attacks (10th September 2021)
Denial-of-service attacks A Denial-of-Service1 (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intend . . . Read more

Date Publish: Sep 11th 21
T2021_14 How to Recover from a Hacked Account (11th August 2021)
Being unable to access your online account for whichever service it”s for, it”s a clear indication that something has gone wrong. This can . . . Read more

Date Publish: Aug 11th 21
T2021_13 How to Use Public WI-FI Safely (6th August 2021)
Wireless networks have transformed the way one uses ICT devices for domestic, office and mobile use. Public wireless networks, popularly known as hots . . . Read more

Date Publish: Aug 6th 21

Pages: 1 - 2 - 3 - 4 - 5 - 6 - 7 - End