1. Home
  2. Blog

Category: Blog

10 Myths about Computer Viruses

10 Myths about Computer Viruses

In this age of computer technology advancement, security threat comes with it. Most of us rely on our personal computers, laptop or mobile devices to do day to day tasks, ordering grocery online, shopping online,…

Read More
SMS Bombing Operation in Passwordless Database Uncovered by a Security Researcher

SMS Bombing Operation in Passwordless Database Uncovered by a Security Researcher

Bob Diachenko, a Cyber Threat Intelligence Director and a journalist at SecurityDiscovery.com has uncovered a massive SMS Bombing Operation that exposes millions of users’ information. You might be wondering why is the uncovering of SMS…

Read More
Capturing Your Visitor’s Email Address: Why is it important?

Capturing Your Visitor’s Email Address: Why is it important?

On this post you will learn how to collect email address on your website and why it is important to do so. There are several bloggers and online business owners don’t realize the importance of…

Read More