Hot Line : +8801926677541

Canon President Convenes to Make Tech Products More Popular. Tazwar Introduces Jute Diversified Products. Bangladeshi Companies to Receive ASOCIO Award. BTRC Still Stands on Their Decision Regarding Call Rate Issue. HSBC Launches App for Export-Import. Assassination on 15th August: An Ignominious Incident the World Witnessed . Bangladesh Lags Behind in Mobile Internet Speed. Google Pays Apple!. UCEP Bangladesh and SCSL to Initiate 'Competency Based Skill Training'. MoU Signed between Green University and dnet. 'Selfi Flash' in Google Camera. "3rd My e-Kids Camp 2017" Held in the Capital. Go Zayaan Launches Website . Second Treble for Aamra Companies. 'SAARC Tech Summit 2017' Brings to a Close . BIJF President Arafath, General Secretary Sabbin. Digicon Technologies Limited: A Global Recognition for Bangladesh. ICT Division's Fund of Tk. 8000 Million for Idea Generators. Mehnaz Kabir Honored in Singapore. BIJF Election to be Held Tomorrow. "3rd My e- Kids Camp-2017" on August12 in the Capital. 40% People across the World Active in Social Media. 'SAARC Tech Summit 2017' Begins to Share the ICT Knowledge to Maintain Cyber Security. IBM Tops in Patent Registration. Selection Round of Junior Science Olympiad Puts to An End. BDCOM Holds a Seminar on 'Driving Bangladesh Connectivity' . Minimum Call Rate in Mobile Phones to Get Higher. 'Campus Partnership Agreement' Signed between UAP and Credit Card Policy Developed in Favor of Banks: CAB. Twitter to Forecast Criminal Activity. Dhaka Public Toilet App Wins International Award. 4G License to Cost Tk. 100 Million. Airtel SIM Conversion to 4G. Three Day-long Smartphone Expo to be Put to an End Tonight . VAT Complications May Cause An Obstacle to 4G License. Huge Crowd Hits the Smartphone Expo on Weekend. Tech Republic Launches New Mono Laser Printer. Uber Launches Community Guidelines for Riders and Driver Partners. Three Day-Long 'Smartphone and Tab Expo' Hits at BICC . Ekattor TV Website Got Hacked.

Kaspersky Security Update

Published On : 16/05/2015

TechWorld News Desk:

Protect what you value most- your unique data The first thing you need to do is make sure you are performing regular back-ups of the data you care about. If you have a Mac, Apple’s Time Machine function along with a dedicated external hard-drive will perform these backups for you. Windows, of course, has an automatic backup feature as well. In fact, the smarter among us are working with multiple backups; one you control (like and external hard drive) and one you don’t control (like a trusted cloud storage provider). This way, if something improbably terrible happens, like your computer becomes infected with and/or destroyed by malware that somehow also corrupts the external hard-drive connected to your machine, you have a third, cloud-based recovery option. The other side of the equation is preventing an infection before it happens. There are two ways of doing this: one is to be smart about what you click on and intentionally or inadvertently download on your computer. The pitfall here is that we’re only humans. Humans make mistakes — not to mention cybercriminals aren’t dumb. They make a living off tricking people like us into installing bad things on our computers. So the other way of preventing infection is to let the machines do it for you by installing a trusted security solution. Malware-driven data loss is a serious problem, so run an antivirus solution and back up your machines. 7 tips to stay secured in iCloud The last week was marked by an internet-wide newsbreak: anonymous hackers somehow obtained explicit photos of various Hollywood celebrities, including many A-listers, like Jennifer Lawrence, and publicized this material on the Internet. Such leaks are not new; however, this one was on a massive scale. To avoid such private data leaks via computers, mobile devices or cloud services, Christian Funk, Senior Security Researcher at Kaspersky Lab, recommends the following measures: 1. Use strong passwords, unique to each account. 2. Use endpoint security solutions to protect your devices, because every device is a gateway to your cloud storage. 3. Enable and use two-factor authentication services whenever available. 4. Sort out which information should or should not be stored in the cloud. Your most sensitive information should never be trusted to the cloud. 5. It’s easy for a mobile device to be lost or stolen, so make sure the device itself has no sensitive data stored on it. If this is impossible, make sure there is appropriate encryption in place. 6. If you’re about to store highly sensitive information (including photos and videos), double check that your device doesn’t automatically upload data into the cloud. 7. Before sharing your personal data or allowing someone to take a picture of you, make sure that the other device is sufficiently secure to keep your private data safe from inadvertent exposure. Top 10 countries where online resources are seeded with malware The following stats are based on the physical location of the online resources that were used in attacks and blocked by antivirus components (web pages containing redirects to exploits, sites containing exploits and other malware, botnet command centers, etc.). Any unique host might become a source of one or more web attacks. In Q2 2014, Kaspersky Lab solutions blocked 354,453,992 attacks launched from web resources located in various countries around the world. 88.3% of the online resources used to spread malicious programs are located in 10 countries. This is 4.9 percentage points more than in the previous quarter. - See more at:

Product Updates
Smart Technologies Introduces GB BKi3HA-7100 BRIX PC ...
Read more
ViewSonic Monitor Offers Free Attractive T-Shirt ...
Read more
Huion Wireless Graphics Tablet hits Bangladesh Market ...
Read more
National Heart Foundation Launches 'eHeart' App ...
Read more
'Bangladeshi Prize Bond Checker App' Developed to Show ...
Read more
Flora Ltd. and Smart Technologies Launched New HP ...
Read more
One to One

Digicon Technologies Limited: A Global Recognition for Bangladesh

Digicon Technologies Limited commenced their journey as business process outsourcing company in the year 2010. The company along with above 1300 skilled employees has been working with great effort for 24 hours and 7 days a week in national and international level both for government and non-government sectors. Besides, the company also ensures recruitment of skilled manpower, standard training session, payroll management, social media management, digital marketing, bank office support and other different developed informative and tech services. World’s many prominent companies including Hinduja Global Solution Limited-India, KPMG and Earnest and Young are the service partners of the ISO 9001: 2008 certified Digicon.

Currently Digicon Technologies Limited is providing their developed customer services through call center to more than 24 companies including couple of telecommunication companies, automobile, pharmaceuticals and VAT online projects of...