Category: Training & How-To
-
How Just Opening an MS Word Doc Can Hijack Every File On Your System | The Hacker News
If you receive a mail masquerading as a company’s invoice and containing a Microsoft Word file, think twice before clicking on it. Doing so could cripple your system and could lead to a catastrophic destruction. Hackers are believed to be carrying out social engineering hoaxes by adopting eye-catching subjects in the spam emails and compromised…
-
Password secrets: Your Passwords Aren’t As Secure As You Think
Password secrets: Your Passwords Aren’t As Secure As You Think – Technotification There is one thing that make us so vulnerable is ignorance. Today, everything is going to be depended on the internet. Yes, and you know it better! and a concept that we use to secure our internet accounts and all is our passwords.…
-
Tips to Protect Yourself from Cyber Scams
According to the Fraud Watch Network from AARP, if you’re using wifi you are probably oversharing. “If you’re using Wi-Fi, you may be oversharing. On a free public network or even at home, using Wi-Fi could mean you’re sharing your credit card numbers, passwords and other personal information with the entire world. Con artists are…
-
How To Change Cortana’s Bing Search to Google in Windows 10 Using Bing2Google
With Bing2Google, you can change this Bing search engine from your Cortana desktop search. Source: How To Change Cortana’s Bing Search to Google in Windows 10 Using Bing2Google Bing’s search function is intricately integrated into the Cortana desktop, so changing your desktop search engine default is extremely difficult. This Chrome extension does it in a…
-
Windows 10 WiFi Ease By Default Causes Vulnerability | Hacked- How To Change Default
A new feature within Windows called “Wi-Fi Sense” shares Wi-Fi passwords with contacts by default, lowering one’s network privacy and security. Source: ‘Wi-Fi Sense’ Vulnerability in Windows 10, the “Most Secure Windows Yet” | Hacked
-
Google Tells You How To Stay Safe Online
Research done by the Google team provides some common sense and conclusive results that will help you stay safe online. Source: Google Tells You How To Stay Safe Online
-
Make the Breakup with Internet Explorer 8 — TODAY!
Yes, there is an official site urging you to break up with IE8. Not just to make us developers lives so much easier — and one less browser to test — but because, little one, it’s definitely way past time. They even make it fun! Start the breakup today! From the official site: #BREAKUPWITHIE8 You’ve…
-
Twitter Bootstrap
Twitter Bootstrap: what is is and what does it mean to you…
-
PWN — The New Term In Town
So you may have been seeing this word “pwn” in articles regarding security and hacking and thought it was a typo and it should have read “own.” Well you’re partly correct. Pwn (pronounced “powned”) “is an leetspeak (elite speak) term meaning to appropriate or to conquer or gain ownership. In hacker-ese, it means to compromise…
-
What is Two-Factor Authentication? Why Should You Care?
What is two-factor authentication? According to Wikipedia: Two-factor authentication (TFA, T-FA or 2FA) is an approach to authentication which requires the presentation of two or more of the three authentication factors: “something the user knows”, “something the user has”, and “something the user is”. There are three generally recognized factors for authentication: something you know…