Blog

March 14, 2019

A registry cleaner removes redundant entries from the Windows registry. Every computer running windows has its own registry, which is made up of a collection of hierarchical databases. These hold settings for software programs, hardware devices, operating system configurations and more. Whenever a new software program is installed or the user modifies a core system […]

March 14, 2019

Malicious software, or malware, is a catch-all term for viruses, bugs, trojans, worms and other nasties hackers use to compromise computers. Like a neoplasm, the consequence of an infection depends on the type of malware and how aggressive it is. Malware can wreak destruction on a computer. Without adequate protection, everyone is at risk. If […]

March 14, 2019

Malware is a collective term for malicious software programs used by hackers and cybercriminals to exploit vulnerabilities in a computer or network. It is dangerous and stealthy, often infecting a computer unbeknownst to the user and sometimes under the nose of an anti-virus program without sufficient detection. Early malware experiments were primitive. They spread locally […]

May 12, 2017

In May 2017, the biggest ransomware attack in history hit the world. The “WannaCry ransomware attack”, as it has since been named, exploited a Microsoft Windows vulnerability in Windows XP and Windows 7 devices. It is unique in that it originated from an exposed, vulnerable internet-facing Server Message Block (SMB) port and not phishing as […]

February 7, 2017

The internet is interesting, but also dark and full of terrors. Children are particularly vulnerable to the dark side of the web, where criminals lurk to exploit and use them. But it isn’t just the general internet like Google search children should be wary of – cyberbullying on social media is prolific and has been […]

January 28, 2016

What is Data Privacy Day (DPD) all about? You only need to look at data privacy breaches that have occurred over the last ten years to realise just how vulnerable your personal information is online. In 2013, Yahoo suffered the biggest data privacy breach of all time (and, perhaps, the biggest that will ever occur) […]

NEWSLETTER

Sign up to-our newsletter and get exclusive deals you wont find anywhere else straight to your inbox!

GET IN TOUCH WITH US

© 2014 Chaplin’s IT Services. All Rights Reserved.