hacker

The good part of using Mac is that you don't have to deal with viruses, adware, trojans and malware that hackers may be injecting using windows operating system.

According to a security Expert, infected web site can redirect an attacker to a person's home if he visits the web site at least once.

Jill Eckhaus , chief executive, AFCOM, the leading association of data center management professionals, said that today's IT managers are facing big challenges about how to handle cyberterrorism.

IT security firm Sophos revealed Monday in its Security Threat 2010 that Facebook and Tweeter are not only for social networker, it is extensively used by cybercriminals.