Articles

How much information does Google have about me? Our lives have become more integrated online than in any other time in history. We interact with each other online via social media, email, and forums; we conduct business via complex, data-driven channels and innovations; and the culture we encou...
Hackers are savvy users who manipulate computer systems and force them to them to do the unintended. If they do this with wicket intent, we call these people black hat hackers. Hacker tools and specific techniques are constantly changing, but black hat hackers do have some predictable approaches whe...
  • Monday, 13 November 2017 11:15
  • Posted by
THE WARNINGS CONSUMERS hear from information security pros tend to focus on trust: Don't click web links or attachments from an untrusted sender. Only install applications from a trusted source or from a trusted app store. But lately, devious hackers have been targeting their att...
Nobody likes internet trolls. They pop up in discussions they weren't invited to and upset as many people as possible. Time and time again we are told the best thing to do is ignore the inflammatory, abusive things they put on forums, comment threads, and even social media posts. However, this is ea...
Welcome, dear user, to the 21st century. Your house is a computer made of bricks and mortar. Your car can drive itself. Everything from the television set in your living room to the juicer in your kitchen, is connected to the internet. Welcome, indeed, to the age of information and data. Where your ...
  • Saturday, 16 September 2017 12:58
  • Posted by
With more organizations introducing technology-based systems such as cloud computing into their work culture, the threat of a cyber-security breach has increased manifold. Internet accessibility has only enabled the critical role of information technology in our daily lives. It has always been ...
ISPs and providers can now sell your personal data thanks to the U.S. Congress. Here’s what you can do to maintain your online privacy. ISPs and providers can now sell your data and browser histories. The U.S. Congress sold you out. If you had any browsing dignity, you don’t now. Too bad yo...
Privacy is more important than ever. The Internet may be the best thing since sliced bread, but as we come to rely on it more and more in our daily life we risk exposing our data to attackers. Here at Cloudwards.net we figured we would help out our readers with a thorough online privacy guide that w...
  • Tuesday, 12 September 2017 12:37
  • Posted by
This week, Bitcoin dipped down to a $4,037 low after China announced it would crack down on cryptocurrencies. Will the Bitcoin bubble pop? On Friday, September 1, Bitcoin hit a phenomenal new high of over $5,000 before falling back with further price declines. Commentators refer to the astonishing c...
We've been talking about the potential of hacker strikes on electric grids for years, and now it looks like the threat is imminent. Symantec reports that a group it calls Dragonfly is targeting energy and power sectors in the US and Europe, with the intention of both learning how these fac...
  • Thursday, 07 September 2017 10:38
  • Posted by
Cover your tracks in any web browser. Your internet history contains all of the browsing secrets you might want to hide. Web browsers keep track of your past activity for a reason. That history comes in handy if you want to find a funny article again, or return to your favorite photo of the kids, or...
Tech companies are leaving your private data unlocked online and there isn’t much you can do about it. (image: Flickr/ Maarten Van Damme) SANTA ROSA, CALIF. — Chances are your private data has probably been available on the web for any random visitor to read. And you may not even be able to...
‘Surveillance is the business model of the internet,’ Berkman and Belfer fellow says In the internet era, consumers seem increasingly resigned to giving up fundamental aspects of their privacy for convenience in using their phones and computers, and have grudgingly accepted that being monitored ...
News roundup: Hackers leveraged eight hijacked Chrome extensions to attack 4.8 million browser users. Plus, Cloudflare stopped protecting a neo-Nazi website from DDoS attacks, and more. New research shows millions of Google Chrome users have been hit with malware through eight hijacked Chrome extens...
By Adeniyi Ogunfowoke With almost everyone relying on the internet to perform tasks, there is barely anything like privacy. All your personal information are readily available to everyone by simply googling your name. However, you can control the information others have access to online thereby guar...
Invading your privacy without your permission is essentially theft, yet it happens every day on the internet and without consequence. Large corporations, law enforcement, the government, and just about anyone who knows how to use the internet, can easily obtain your personal information in a matter ...
A new form of malware hit the internet Tuesday, shutting down systems across Europe and impacting companies from the U.S. to Russia. Unfortunately, the attack, which early reports indicate seems to have hurt Ukrainian organizations and agencies more in particular, is still largel...
HIGHLIGHTS Fireball steals sensitive user data and manipulates regular surfing data CERT-In has issued its latest advisory to Internet users It said the virus can be detected by majority of anti-virus solution Cyber-security sleuths have alerted Internet users against the destructive activity of a ...
While the Internet has always been a risky place to test new ideas, the stakes today are higher than ever. The reason? Explosive growth: In 2004 there were 51 million websites online. Now there are over a billion websites and at least 28 billion Internet-connected devices. There is also more money i...
With so much of life lived online, it can be hard to remember passwords for every app and platform you're on, but re-using them is putting people at an ever-increasing risk of being hacked. The recent data breach of food and restaurant search engine Zomato saw hackers steal 17 million users' data. T...
Rafotech holds the power to initiate a global catastrophe," claimed Check Point.Markus Spiske/Unsplash A massive malware campaign that has the power to "initiate a global catastrophe" has currently infected more than 250 million computers worldwide. The software, dubbed "Fireball", can take control ...
  • Saturday, 03 June 2017 11:43
  • Posted by
CREDIT: Getty Images Cloak & Dagger vulnerability uses Android's own features to fool users. Do you like downloading and trying a wide range Android games and apps? You may want to rethink that habit, or at least proceed with caution. A newly disclosed Android vulnerability means miscreants can ...
A TERRIFYING new malware attack – that enables hackers to silently take control of your smartphone and siphon private data – can be used on all versions of the Android operating system, researchers have sensationally claimed. Cybercrminals can record EVERYTHING you do on your Android phone A cat...
A single setting could make all the difference when it comes to keeping your device secure. Apple's iOS is a real walled garden. With the exception of those brave enough to "jailbreak" their phones, Apple controls which apps get into its App Store, and which don't.   On Android, it's not so sim...
Over a million devices have already been affected by an Android malware named Gooligan, which compromises Google account data on these devices, giving the attacker access to user’s Gmail, Google Photos, Google Docs, Google Play, Google Drive and other Google related application...
Page 1 of 10

airs logo

AIRS is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Subscribe to AIRS Newsletter

Receive Great tips via email, enter your email to Subscribe.
Please wait

Follow Us on Social Media

Want to read more content?
Register as "AIRS Guest"
Enjoy Guest Account

Login or Create New Account