0405119483 [email protected]

Do you Need to Monitor Your Child’s Internet Activity?

’s online activitiesBefore you take any assistance of any kind of tool to monitor a child’s internet activities, it is very important rather essential to counsel your child and make him aware of all the pros and cons of its usage. Let your children know how they can...

Phone Scams and Computer Security

I have encountered numerous instances where I had to assess compromised computers after their owners fell victim to phone scammers. These scams often involve a caller pretending to be from trusted organizations like Telstra or NBN, claiming to have identified...

Security Roundup

FluBot malware  poses as Flash Player app FluBot represents a formidable banking malware that cunningly preys on Android phone users, aiming to gain unauthorized access to their banking credentials. This insidious attacker employs a clever strategy of superimposing...

Android Malware on the Rise

In a recent post I mentioned that malaware for Android phones ie Samsung , HTC , LG was on the rise. The following are examples of attacks focused on phones with this Operating System. ADROID FAKDEFENDER – has recently been found by Symantec researchers in some...

How to Browse the Web Anonymously

I know many of you are concerned about how easy it is to trace your online activity and how that infomation can be used and while I am not suggesting you engage in criminal activity it occurred to me that the collar bomber who attempted to extort money from the pulver...

Can you be Too Paranoid about Security

Well the answer happens to be yes.  A recent article in Ars technica explains In the U.S. in 2011, the Department of Homeland Security informed the Economic Development Authority  and the National Oceanic and Atmospheric Administration (NOAA) that there was a possible...