How to Survive the End of Windows XP and Safeguard your PC

And the 12-year old legend is finally nearing its end. Until 2011, XP was ruling with a mammoth market share of 43.29%. And despite being a retro OS, XP still stands out as the second most popular operating system; presently, having a market share of 29.53%. That roughly equals to 500 million PCs according to […]

The End is Near for Windows XP. Is Your Business Prepared?

When Windows XP was first released in October 2001, the Apple iPod was just 2 days old and Wikipedia had only been around for a few months. But now, there is less than a month to go for Microsoft to pull the plug on Windows XP with the impending deadline of April 8, 2014 just […]

Web security basics: Watering hole attacks VS phishing attacks

Computer users who are well versed with security threats know why and how clever phishing pages must be avoided. Clear signs help to identify fake phishing pages but what does one do against a “watering hole attack”? What exactly is a watering hole attack? A watering hole attack is a technique whereby users are profiled […]

Google Play Store may soon get a built-in malware scanner

Google intends to release a future update to its Google Play Store that will provide client-side protection from malware present in malicious applications. This malware scanner will analyze an application when a user attempts to install it on an Android device. If there is a known strain of malware present in the application, the user […]

The End is Near for Windows XP

Microsoft has gone a step further to purport the arrival of the upcoming Windows 8 operating system by declaring that post April 8, 2014 they will be withdrawing support for Windows XP. This gives home users and business enterprises two years to complete their migration from the OS that has been around since August 24, […]

Microsoft Windows win32k.sys Memory Corruption Vulnerability

A vulnerability has been discovered in Microsoft Windows which can be exploited by malicious parties to potentially compromise a user’s system. The vulnerability is caused due to an error in win32k.sys and can be exploited to corrupt memory via a specially crafted web page containing an IFRAME with an overly large “height” attribute. This is […]