Cyber Virus

SQL Injection Protection in PHP With PDO

Database abstraction layers like PHP’s Portable Data Objects (PDO) are not a new concept, but a lot of developers don’t seem to realise the security… Read More »SQL Injection Protection in PHP With PDO

What Can Thieves Do With Your Stolen Credit Card?

Usually, the thieves are in the ‘business’ of stealing credit card data from several unsuspecting victims. So they will first add your stolen card data… Read More »What Can Thieves Do With Your Stolen Credit Card?

Secure Your Business Data With Microsoft Products

Every business organization generates valuable information or data that is an asset of the firm. With increased number of cyber-attacks and data breaches, companies are… Read More »Secure Your Business Data With Microsoft Products

How to Pursue a Career in Ethical Hacking

Ethical hacking is the process of penetrating or intruding in a computer system for the purpose of security testing. Hackers who conduct ethical hacking are… Read More »How to Pursue a Career in Ethical Hacking

I Am Victimized! What Next?

In the world we live in today, being a cyber crime victim is no alien thing. According to a report by RSA reports on Cybercrime,… Read More »I Am Victimized! What Next?

Data Protection As a Website Liability Issue

The much publicized lawsuits against Target arising from hacked breaches into its consumer credit and debit cards records is only the face of a rising… Read More »Data Protection As a Website Liability Issue

How Do Employment Practices Apply to Volunteers?

Many nonprofits rely on volunteers in addition to paid employees to achieve their goals. Few of these organizations, however, fully grasp the legal distinctions between… Read More »How Do Employment Practices Apply to Volunteers?