Freeware Files | Download Free Software

Technology News | Security

China strikes back at U.S. categories that are challenged by Chinese hackers, suggesting that U.S. officials have organized cyber attack aginst the Asian country.

From the Chinese Ministry of Defense, said that the reports of cyber attacks on the part of the country to the U.S. and other objectives, is entirely inaccurate.

According to a survey made in just 47 hours from the Internet Watch Foundation, 88% of the pictures and videos created and uploaded to the Internet by young people, copied and found in 68 other websites in which their authors had no control.

Indeed, the websites which contained a large amount of sexual content concludes the research.

Before you let your child walk alone in a big city, he must have a certain age and he have to learn some things.

So every parent needs to possess relevant education for himself, to be able to guide a child, before letting it free to the "highway of the internet" and the "information society."

Often we hear about the botnets which are located in various countries, mainly in Latin America, Asia and Eastern Europe. But many of them are in western countries including the U.S..

A botnet is a group of computers (called zombies) which has been infected by a malware which dictates to the computers in order to perform specific tasks, such as sending spam mail, spread malware, etc. Whoever has control of the infected computers, he can guide them by sending commands via one or more Command Control server (C & C server).

U.S. issued a recommendation to the Java users to temporarily disable the execution of "Java applet" from their browsers, at the risk of attacks.

Oracle has issued a critical update of the Java for browsers, but security experts insist that it is not enough to make the navigation on the Web safe, where Java applets are hidden and hungry for personal user data.

Viruses that target Android devices are expected to spread in 2013. With the help of Trojan viruses, cybercriminals will be able to use Android devices in their purposes.

Washington, a new generation of viruses designed to infect smartphones and turn them into subservient to the online underworld, threatens to spread to the year ahead, warn security and computer systems companies after the resubcording of cases like this in Android devices.

  1. Latest News
  2. Most Popular
  3. Top Rated
  4. Latest Comments
  • Michael A
    Why they do not shut down the company that provides the faulty patchwork systems that make such malware first possible? No, not because of a faulty ...

    Read more...

     
  • Moubreb
    The people at any router between You and facebook can read Your communication if: 1. You're using an http: connection 2. A fake facebook certificate ...

    Read more...

     
  • theoctagon
    You could always just use what's already baked in: Android Device Manager. https://www.google.com/android/devicemanager

    Read more...

     
  • Michael A
    AFAIR the patch was available one day after the discovery of heartbleed. That normal with Free Software. Only mislead users of commercial scrap have ...

    Read more...

next
prev

Quick Search

Powered by Liquidtroll
Prev Next

Apple Inagurates New TV Ad Commercials For iPhone 4S

10-02-2012 Hits:3598 Apple Panagiotis K. - avatar Panagiotis K.

Two new commercials aired by Apple which called "Rock God" and Road Trip." With these TV Ads for iPhone 4S Apple planning to highlight Siri which is the staple feature of...

Infographic: Engineering The Internet

11-11-2012 Hits:1518 Latest Panagiotis K. - avatar Panagiotis K.

The internet world is great, it allows us to chat, to play and stay connected with all people we like. With the internet you can search, you can study and of...

How to Secure My iPad

02-02-2012 Hits:4693 Apple Panagiotis K. - avatar Panagiotis K.

How to Secure My iPad

Apple’s iPad owners getting more and more day by day, the security breach in which 114,000 users on the AT&T network had their email addresses exposed, so downloading some security...

Regain your privacy with these 3 browser add-ons

28-05-2014 Hits:980 Software Panagiotis K. - avatar Panagiotis K.

Regain your privacy with these 3 browser add-ons

With so many advertisers, social networks, and other companies interested in your data, it's pretty hard to stay private online these days. But don't reach for that tinfoil hat just yet!...

Hacking A SIM Card In Just 2 Minutes!

23-07-2013 Hits:2582 Hacking Vasia L. - avatar Vasia L.

Hacking A SIM Card In Just 2 Minutes!

Karsten Nohl,  a cryptographer and security researcher at Security Research Labs in Berlin, discovered a security hole that allows someone to access SIM cards with the help of only two...