Freeware Files | Download Free Software

Technology News | Security

China is banning Windows 8 devices from at least some government IT purchases, in a mysterious move that took Microsoft off guard.

The ban came from China’s Central Government Procurement Center, which posted a brief notice last Friday on new requirements for government tenders.

Whether spending on a completely new or upgraded system, access authentication system costs are brutal.

Despite the amped up "sophisticated" security and clock-in systems enterprises currently spend too much money on, many organizations remain vulnerable to security threats, including human error and hackers.

For the latest round of Microsoft’s monthly collection of software patches, the company has fixed critical issues in Internet Explorer (IE) and Windows that have already been used by malicious attackers to compromised systems.

It is the software that Microsoft has not patched this month that is probably of greatest interest to attackers.

Last month Google offered refunds to users who bought a fake antivirus app from Google Play, but the scam seems to be catching on.

Security researchers have recently identified similar apps in both the Android and Windows Phone app stores.

Dropbox has disabled old shared document links in a bid to prevent its users’ files from being accessed by unintended recipients.

Before the change, anyone in possession of a Dropbox shared document link could access the file it pointed to, but the documents were inaccessible to those without the link, a form of security through obscurity.

They spread lies. They push products you don’t care about. They make unpopular people look popular. Sometimes, they take over your machine with malware.

Twitter’s got bots, and researchers are fighting back. At Indiana University in Bloomington, researchers have developed an app called Bot or Not, designed to identify accounts on Twitter that are controlled by insidious robots or software.

  1. Latest News
  2. Most Popular
  3. Top Rated
  4. Latest Comments
  • Michael A
    Why they do not shut down the company that provides the faulty patchwork systems that make such malware first possible? No, not because of a faulty ...

    Read more...

     
  • Moubreb
    The people at any router between You and facebook can read Your communication if: 1. You're using an http: connection 2. A fake facebook certificate ...

    Read more...

     
  • theoctagon
    You could always just use what's already baked in: Android Device Manager. https://www.google.com/android/devicemanager

    Read more...

     
  • Michael A
    AFAIR the patch was available one day after the discovery of heartbleed. That normal with Free Software. Only mislead users of commercial scrap have ...

    Read more...

next
prev

Quick Search

Powered by Liquidtroll
Prev Next

How to Hack the Social Media Accounts

13-06-2014 Hits:1843 Hacking Panagiotis K. - avatar Panagiotis K.

How to Hack the Social Media Accounts

Why would hackers break into someone else’s profile especially when there is nothing of great value? Holiday photos, latest purchases and restaurant reviews you have put up in your Face book...

Government stumps up $18.4m to fix NBN satellite service

25-03-2014 Hits:683 Latest Panagiotis K. - avatar Panagiotis K.

Government stumps up $18.4m to fix NBN satellite service

An AU$18.4 million deal to expand capacity on the NBN interim satellite service will bring the speed up from below dial up, according to Communications Minister Malcolm Turnbull. Communications Minister Malcolm...

VPN provider proves OpenVPN private keys at risk from Heartbleed bug

19-04-2014 Hits:1085 Security Panagiotis K. - avatar Panagiotis K.

VPN provider proves OpenVPN private keys at risk from Heartbleed bug

The fallout from the OpenSSL Heartbleed bug continues. Recently, personal virtual private network provider Mullvad said it was able to extract private encryption keys for OpenVPN from a test server.

The New Philosophy of Hacking

20-11-2012 Hits:1763 Hacking George Q - avatar George Q

The New Philosophy of Hacking

 As we said in previous articles, until relatively recently, the subject of hacking attempts were young luminaries computers to make demonstration of their skills or to spend a pleasant time.Today,...

Regain your privacy with these 3 browser add-ons

28-05-2014 Hits:959 Software Panagiotis K. - avatar Panagiotis K.

Regain your privacy with these 3 browser add-ons

With so many advertisers, social networks, and other companies interested in your data, it's pretty hard to stay private online these days. But don't reach for that tinfoil hat just yet!...