Freeware Files | Download Free Software

Technology News | Security

A three-fold increase in Microsoft Windows computers infected with malicious software in late 2013 came from an application that was for some time classified as harmless by security companies.

The finding comes as part of Microsoft’s latest biannual Security Intelligence Report (SIR), released on Wednesday, which studies security issues encountered by more than 800 million computers using its security tools.

Adobe Systems released emergency security updates for Flash Player in order to fix a vulnerability that has been exploited in attacks against users since earlier this month.

The attacks were discovered by security researchers from Kaspersky Lab and were launched from a website set up by the Syrian Ministry of Justice to receive complaints about law violations. It’s not clear who was behind the attack, but the site had been compromised in the past by hackers.

It once sounded like paranoia; now it’s more like common sense. A user asked for safe and secure ways to access the Internet without being tracked by crooks, corporations, and governments.

There’s no such thing as complete, 100-percent perfect privacy or security. The Heartbleed vulnerability made that patently clear. But you can lock down your Internet access, making a security breach much less likely.

Cloud computing is secure. It may sound like an obvious thing to say for someone who works at a company specialising in ensuring a smooth, reliable and secure network, but there are still misconceptions about cloud security.

These concerns and misconceptions often arise from fears over losing control.

Police shouldn’t be able to search suspects mobile phones at the time of arrest because of the huge amounts of private information now stored on those devices, lawyers for two criminal defendants argued before U.S. Supreme Court Tuesday.

The Supreme Court should make an exception for mobile phones in long-standing case law allowing police officers to search suspects at the time of the arrest without getting a court-ordered warrant, lawyers for the two defendants argued.

Cybercriminals stole debit card information from customers of dozens of financial institutions in a phishing campaign that combined rogue text messages and with VoIP calls.

The vishing—voice phishing—campaign was discovered by researchers from cybercrime intelligence firm PhishLabs while investigating a recent attack against customers of an unnamed midsize bank.

  1. Latest News
  2. Most Popular
  3. Top Rated
  4. Latest Comments
  • Michael A
    Why they do not shut down the company that provides the faulty patchwork systems that make such malware first possible? No, not because of a faulty ...

    Read more...

     
  • Moubreb
    The people at any router between You and facebook can read Your communication if: 1. You're using an http: connection 2. A fake facebook certificate ...

    Read more...

     
  • theoctagon
    You could always just use what's already baked in: Android Device Manager. https://www.google.com/android/devicemanager

    Read more...

     
  • Michael A
    AFAIR the patch was available one day after the discovery of heartbleed. That normal with Free Software. Only mislead users of commercial scrap have ...

    Read more...

next
prev

Quick Search

Powered by Liquidtroll
Prev Next

Dropbox disables old shared document links to prevent unauthorized access

09-05-2014 Hits:1020 Security Panagiotis K. - avatar Panagiotis K.

Dropbox disables old shared document links to prevent unauthorized access

Dropbox has disabled old shared document links in a bid to prevent its users’ files from being accessed by unintended recipients. Before the change, anyone in possession of a Dropbox shared...

Windows XP OS Is Still Alive. But For How Long?

02-05-2013 Hits:1712 Microsoft George Q - avatar George Q

Windows XP OS Is Still Alive. But For How Long?

In 439 days - that means on April 8, 2014 - Microsoft will discontinue the expanded support for the Windows XP. This date (04/08/14) is not chosen at random. It is...

Save your Word configurations

01-06-2014 Hits:1031 How To Panagiotis K. - avatar Panagiotis K.

Save your Word configurations

When some users set up Microsoft Word the way they like. Then, suddenly, everything went back to the default settings. Can they get their old settings back? Or at least...

Twitter agrees to acquire data firm Gnip

15-04-2014 Hits:798 Social Networks Panagiotis K. - avatar Panagiotis K.

Twitter agrees to acquire data firm Gnip

Twitter has agreed to acquire social data technology provider Gnip. The acquisition will enable Twitter to provide enhanced user data to third-parties. Boulder-Colo.-based Gnip was founded in 2008. Gnip was Twitter's...

5 Mistakes of Steve Jobs

13-02-2013 Hits:2924 Apple Maria R. - avatar Maria R.

5 Mistakes of Steve Jobs

Visionary, pioneer, genius ... some of the characterizations that, admittedly fit into Steve Jobs. You would think that the Apple founder had never done anything wrong! Yet ...