How big a vulnerability is phone number theft and how to protect against this? [on hold]

This interesting article in the NYT discusses how attackers are stealing phone numbers of their intended victims by phoning up Verizon, AT&T, etc., giving them a sob story about an emergency and convincing the phone compa… Continue reading How big a vulnerability is phone number theft and how to protect against this? [on hold]

What causes the "This site may be hacked" or "This site ahead contains malware" messages?

How does Google exactly detect if a site may/is hacked? What exactly triggers the warnings?

I’ve seen plenty of companies offer services that help to remove these warnings on websites and get your site removed from this ‘bla… Continue reading What causes the "This site may be hacked" or "This site ahead contains malware" messages?

What causes the "This site may be hacked" or "This site ahead contains malware" messages?

How does Google exactly detect if a site may/is hacked? What exactly triggers the warnings?

I’ve seen plenty of companies offer services that help to remove these warnings on websites and get your site removed from this ‘bla… Continue reading What causes the "This site may be hacked" or "This site ahead contains malware" messages?

Google ridding MR from search results

Modern-day cyber criminals utilize every resource possible to launch attacks, one of which has been publicly available until now. Google had just overhauled its personal information policy, especially for the healthcare industry, resulting in the remo… Continue reading Google ridding MR from search results