Category: Security

OSFI Releases Cyber Security Self-Assessment Guidance

OSFI released its Cyber Security Self-Assessment Guidance (the “Guidance”) to aid Federally Regulated Financial Institutions (“FRFI”) in assessing its level of preparedness against cyber risks. The Guidance was drafted in response to OSFI’s Plans and Priorities for 2013-2016, a plan…
Avira Internet Security Review

Avira has been in the security solutions business for over 25 years. All development is done in-house at their primary offices in Germany. They have other offices and partnerships spanning the world, including Europe, Eastern Asia and North America. Avira…
Kaspersky Small Office Security reviews

Everybody is talking about the newly released security software by Kaspersky. It’s called Kaspersky Small Office Security and it offers maximum security for offices. Businesses reply heavily on their systems to defend against data breach security threats and avoid the…
AVG Internet Security Review

If you are looking for an all-in-one application which takes care of the spam, malware, viruses and even detects rootkits, besides offering firewall, online shield, email and link scanner, then AVG internet security suite 2011 is for you. With a…
Webroot Internet Security Complete

Internet Security Complete by Webroot offers consumers a complete internet security solution. Going well beyond your typical security software, this solution offers a comprehensive and powerful set of features designed to keep your computer and your identity safe. Let’s review…
Kaspersky Internet Security Review

Kaspersky internet security 2011 (short: KIS2011) is the newest suite from Kaspersky that includes not only the antivirus but also antispyware, popup blocker, firewall and much more. Kaspersky is not the most user-friendly internet security suite because of its many…
Avast Internet Security Review

Security is one of the most important parts about protecting your computer and accessing the internet, no matter whether you use your computer for business or just personal enjoyment. New viruses are sent out every day and all kinds of…
ZoneAlarm Internet Security 2012 Review

Here we review ZoneAlarm Internet Security 2012, one the the best internet security software solutions available today. ZoneAlarm is owned by Check Point Software Technologies, Inc. Their software currently runs on over 60 millions PCs worldwide, helping protect consumers and small business…
Norton Internet Security Review

Norton Internet security 2012 remains on of the top3 suits and adds new and unique features. NIS2012 is definitely one of the best choices around. It’s fast, good and hassle-free. If you want the best protection try Norton Internet Security…
Why Internet Security is Important

The internet has become a necessary tool for anyone and everyone living in modern society, but that does not necessarily mean that it is a safe haven at all times. In fact, the truth is that every time you log…
Securely sell your iPhone

Recently we were talking to some of our site visitors and they were mentioning how they use a service like iDealers.com to sell their iPhone. That’s fine. We’ve heard nothing but good things about their service but we wanted to…

A major topic we often field questions concerning is that of keylogging software, or keyloggers as they are called. If you are unfamiliar with this type of software, it allows for the owner/operator of a computer to chronicle everything that…

Bitcoin is the first decentralized digital currency that enables instant payments to anyone, anywhere in the world using the Internet. The transactions are done directly from person to person without the involvement of a bank in between by using Internet.…

IP Fragmentation occurs when the packets want to pass through a link with a smaller maximum transmission unit (MTU) than the original datagram size. The 16-bit identification field, 3-bit Flags field that includes more fragments, and don’t fragment bits and…

In a traditional network switch, the packet forwarding (done by the data plane) and the high-level routing decisions (done by the control plane) occur on the same hardware or device. The purpose of SDN (Software-defined networking) approach is to separate…

In the article What is BYOD we got a basic idea about the term BYOD and we came to know that major hurdles in implementing this in large scale are some security issues. Enterprises do not want to sacrifice security…

If you are working in an enterprise where you need to use laptop for your daily work, it is highly likely that you might have come across the term BYOD in recent past. Bring Your Own Device (BYOD), is a…