Of Hacks & Keyloggers – Part 1

It's only fair to share...Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Email this to someonePrint this pageShare on RedditShare on StumbleUpon

Of Hacks & Keyloggers…!!! “I don’t know what happened!; I don’t remember visiting any dodgy websites, downloading any weird apps, opening any suspicious emails or attachments, let alone links!, why I am receiving these sms & email notifications from my Bank!?!?” Sounds familiar right? Come to think of it, in most cases the unsuspecting victim is being honest. That being said, I just remembered something; a previous write up revolving around one of the methods used to carry out this type of attack. It can happen to anyone, in fact I was once a victim!

 

 

What is a keylogger? 

Read moreOf Hacks & Keyloggers – Part 1

The ‘Security by’ model approach

It's only fair to share...Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Email this to someonePrint this pageShare on RedditShare on StumbleUpon

Passionate about it! Intrigued by it! Confused by it! SaaS, RaaS, XaaS, what! what!, okay let me PaaS, oops meant pass! Unlike the as-aservice model that inherently loves prepending strange InfoTech words, I am going to talk about another model, that seems to enjoy appending weird random like words; the ‘Security by’ model! Don’t you just love it? Oops, I meant I.T! Security by Obscurity, Security by Isolation, Security by Default!; The ‘Security by’ model approach!

 

 

The ‘Security by’ model approach seems to share and rely on; 

Read moreThe ‘Security by’ model approach

MyBitSecure – Codename ‘D3m0’ Project

It's only fair to share...Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Email this to someonePrint this pageShare on RedditShare on StumbleUpon

By MyBitSecure –  March 13, 2017 – mybitsecure.com

Have you ever had a brilliant I.T Security idea, which you needed an expert to tailor-make for you but where hesitant to pursue because you felt that you might end up not liking the idea / product at a later stage, or because of your fear of the costs involved? Well, look no further, The MyBitSecure Team will not only built an awesome custom solution for you, but will make arrangements to initially give you the Hardware-based security solution as a Demo unit to test drive (at no costs) for at least two weeks before you make your final decision. The MyBitSecure – Codename ‘D3m0’ Project. Below is a list of MyBitSecure’s I.T Security solutions on Demo! Read More

MyBitSecure – Open Source-Based I.T Security Solutions!

It's only fair to share...Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Email this to someonePrint this pageShare on RedditShare on StumbleUpon

Author: MyBitSecure I.T Security Team
Source: http://www.mybitsecure.com/

MyBitSecure offers customised, discrete and specialised Open Source-based Information Technology (I.T) Security Solutions to Home users, Academic Institutions, Small & Medium Business Enterprises. We believe if you value Information Security focused solutions with other businesses, computers & users and don’t want to be limited by interoperability, proprietary data formats or homogeneous systems; Open Source-based I.T Security solutions are definitely the way to go!

Who needs MyBitSecure

Read moreMyBitSecure – Open Source-Based I.T Security Solutions!