Freeware Files | Download Free Software

Technology News | Security

China strikes back at U.S. categories that are challenged by Chinese hackers, suggesting that U.S. officials have organized cyber attack aginst the Asian country.

From the Chinese Ministry of Defense, said that the reports of cyber attacks on the part of the country to the U.S. and other objectives, is entirely inaccurate.

According to a survey made in just 47 hours from the Internet Watch Foundation, 88% of the pictures and videos created and uploaded to the Internet by young people, copied and found in 68 other websites in which their authors had no control.

Indeed, the websites which contained a large amount of sexual content concludes the research.

Before you let your child walk alone in a big city, he must have a certain age and he have to learn some things.

So every parent needs to possess relevant education for himself, to be able to guide a child, before letting it free to the "highway of the internet" and the "information society."

Often we hear about the botnets which are located in various countries, mainly in Latin America, Asia and Eastern Europe. But many of them are in western countries including the U.S..

A botnet is a group of computers (called zombies) which has been infected by a malware which dictates to the computers in order to perform specific tasks, such as sending spam mail, spread malware, etc. Whoever has control of the infected computers, he can guide them by sending commands via one or more Command Control server (C & C server).

U.S. issued a recommendation to the Java users to temporarily disable the execution of "Java applet" from their browsers, at the risk of attacks.

Oracle has issued a critical update of the Java for browsers, but security experts insist that it is not enough to make the navigation on the Web safe, where Java applets are hidden and hungry for personal user data.

Viruses that target Android devices are expected to spread in 2013. With the help of Trojan viruses, cybercriminals will be able to use Android devices in their purposes.

Washington, a new generation of viruses designed to infect smartphones and turn them into subservient to the online underworld, threatens to spread to the year ahead, warn security and computer systems companies after the resubcording of cases like this in Android devices.

  1. Latest News
  2. Most Popular
  3. Top Rated
  4. Latest Comments
  • Michael A
    Why they do not shut down the company that provides the faulty patchwork systems that make such malware first possible? No, not because of a faulty ...

    Read more...

     
  • Moubreb
    The people at any router between You and facebook can read Your communication if: 1. You're using an http: connection 2. A fake facebook certificate ...

    Read more...

     
  • theoctagon
    You could always just use what's already baked in: Android Device Manager. https://www.google.com/android/devicemanager

    Read more...

     
  • Michael A
    AFAIR the patch was available one day after the discovery of heartbleed. That normal with Free Software. Only mislead users of commercial scrap have ...

    Read more...

next
prev

Quick Search

Powered by Liquidtroll
Prev Next

YouTube Now Supports The Convert Of Conventional Video In Slow Motion

29-05-2013 Hits:1695 Latest Panagiotis K. - avatar Panagiotis K.

YouTube Now Supports The Convert Of Conventional Video In Slow Motion

Google announced that their platform now supports slow motion videos, offering the similar instrument, so videos will look like they were written by a high speed camera. The relevant tool for...

Bless Or Curse... Our Addiction To The Internet

27-03-2013 Hits:2149 Latest Panagiotis K. - avatar Panagiotis K.

Bless Or Curse... Our Addiction To The Internet

Officially, Internet addiction is not a psychiatric disease. However, the disorder is present either in the Internet, technology in General or in gaming, either linked to depression and anxiety or...

Leaked email shows close working relationship between NSA, Google

09-05-2014 Hits:1167 Latest Vasia L. - avatar Vasia L.

Leaked email shows close working relationship between NSA, Google

Google remains an outspoken critic of mass surveillance operations by the National Security Agency (NSA)... But it appears both sides were exchanging a large amount of emails. NSA Director Gen. Keith...

What are botnets and Cybercriminal gangs? Rapid increase in World Wide Web …

01-04-2012 Hits:3940 Security Vasia L. - avatar Vasia L.

What are botnets and Cybercriminal gangs? Rapid increase in World Wide Web crime and malware attacks

Before we begin to present the research I will give you a different definition and concepts related to / the botnet (s):  Botnets are malware attacks from many different entities on...

Gamers are more social and educated than non-gamers says study

08-06-2014 Hits:646 Games Panagiotis K. - avatar Panagiotis K.

Gamers are more social and educated than non-gamers says study

There are plenty of people out there that don't like video games and believe that games are bad for you. A new study that was commission by Twitch, the steaming game...