In this current generation, content management tools like WordPress has transformed our working style into an extremely easy and simple manner that occupies approximately the whole world. But the question comes here is: is using WordPress always...
Home » Posts filed under computer security
Steps To Be Taken For WordPress Security Issues
in
computer security,
data security,
online security,
wordpress
- By
Mohamed Shimran
- on 11/07/2015
- 8 comments
High Amounts of DDoS Attacks in 2013
in
2013,
attack,
bandwidth,
banking,
computer security,
computers,
Data,
date,
ddos,
DDoS attacks,
DNS,
entertainment industry,
financing,
hacks,
infographic,
infosec,
insurance,
media,
quarters,
tech
- By
Mohamed Shimran
- on 3/15/2014
- 4 comments

The year of 2013 saw high amounts of Distributed Denial of Service (DDoS) attacks. Beginning in March, finance, banking, and insurance companies were the focus of an assault that lasted for 14.6 days. Through the year, the attacks ranged from 20.6...
Labels:
2013,
attack,
bandwidth,
banking,
computer security,
computers,
Data,
date,
ddos,
DDoS attacks,
DNS,
entertainment industry,
financing,
hacks,
infographic,
infosec,
insurance,
media,
quarters,
tech
The Most Audacious Hacks in Computer History
in
best,
best hackers,
best hacks,
CIA,
cold war,
computer history,
computer security,
computers,
cyber attacks,
hacks,
infosec,
internet,
security,
siberia,
spy,
tech,
technology,
trojan,
us,
usa
- By
Mohamed Shimran
- on 3/14/2014
- No comments

When we think of warfare, most people will speak of the horror. Guns, tanks, bombs and explosions. Death and destruction everywhere. This is what war brings to people and to places.
However, there’s another form of warfare that is becoming increasingly...
Labels:
best,
best hackers,
best hacks,
CIA,
cold war,
computer history,
computer security,
computers,
cyber attacks,
hacks,
infosec,
internet,
security,
siberia,
spy,
tech,
technology,
trojan,
us,
usa
The History of Hacking Culture
in
best hackers,
best hacks,
computer,
computer hacking,
computer security,
computers,
hack,
hackers,
hacking,
hacking culture,
hacking in old days,
history of hacking,
infosec,
IT,
old hacks,
tech,
technology
- By
Mohamed Shimran
- on 2/17/2014
- No comments

Hacking culture is changing and developing all the time. The modern world is full of flaws to discover and secret places to explore. It makes sense that people are fascinated with the subject, but how has it progressed over time?
In 1975 the “Robin...
What to Look for in Your Next DDoS Mitigation Provider
in
computer security,
computers,
ddos,
ddos protection,
hack,
infosec,
tech,
technology
- By
Mohamed Shimran
- on 1/21/2014
- 2 comments

DDoS attacks are serious and could be detrimental to your brand and products. You need a DDoS mitigation provider that you can trust to protect your product and image. If you are looking for a new provider, a few key components go into an excellent...
Five Reasons Security Is A Necessity When Purchasing A New Mobile Device
in
best smartphones,
computer security,
infosec,
mobile phones,
mobile security,
mobile technology,
Smartphone
- By
Mohamed Shimran
- on 1/10/2014
- 5 comments

You need security for your smartphone.
Are you thinking of buying yourself a new mobile phone this Christmas season? If so, you should know that you will need to have security installed on it as soon as you buy it, otherwise you will almost certainly...
Ways to Keep Your Personal Information Secure
in
business technology,
computer,
computer security,
fraud,
identity fraud,
identity protection,
identity theft,
identity theft protection,
infographic,
infographics,
protecting your business,
technology
- By
Mohamed Shimran
- on 12/28/2013
- 7 comments

It is estimated that 10 million individuals each year are victims of identity theft. In order to eliminate theft and fight back against fraudsters it is important to take all of the steps possible to protect your valuable information. Do not carry...
Pros And Cons Of AdAware Anti-Spyware Program
in
business software,
business technology,
computer security,
malware,
malware removal,
Spyware,
spyware and viruses,
spyware removal
- By
Mohamed Shimran
- on 11/06/2013
- 3 comments

Often when you surf the Internet going from site to site adware is installed on your computers. This happens when you download a free application or even give out your email. It is a marketing tool that is used for finding out what websites you go to...