Freeware Files | Download Free Software

Technology News | Security

China strikes back at U.S. categories that are challenged by Chinese hackers, suggesting that U.S. officials have organized cyber attack aginst the Asian country.

From the Chinese Ministry of Defense, said that the reports of cyber attacks on the part of the country to the U.S. and other objectives, is entirely inaccurate.

According to a survey made in just 47 hours from the Internet Watch Foundation, 88% of the pictures and videos created and uploaded to the Internet by young people, copied and found in 68 other websites in which their authors had no control.

Indeed, the websites which contained a large amount of sexual content concludes the research.

Before you let your child walk alone in a big city, he must have a certain age and he have to learn some things.

So every parent needs to possess relevant education for himself, to be able to guide a child, before letting it free to the "highway of the internet" and the "information society."

Often we hear about the botnets which are located in various countries, mainly in Latin America, Asia and Eastern Europe. But many of them are in western countries including the U.S..

A botnet is a group of computers (called zombies) which has been infected by a malware which dictates to the computers in order to perform specific tasks, such as sending spam mail, spread malware, etc. Whoever has control of the infected computers, he can guide them by sending commands via one or more Command Control server (C & C server).

U.S. issued a recommendation to the Java users to temporarily disable the execution of "Java applet" from their browsers, at the risk of attacks.

Oracle has issued a critical update of the Java for browsers, but security experts insist that it is not enough to make the navigation on the Web safe, where Java applets are hidden and hungry for personal user data.

Viruses that target Android devices are expected to spread in 2013. With the help of Trojan viruses, cybercriminals will be able to use Android devices in their purposes.

Washington, a new generation of viruses designed to infect smartphones and turn them into subservient to the online underworld, threatens to spread to the year ahead, warn security and computer systems companies after the resubcording of cases like this in Android devices.

  1. Latest News
  2. Most Popular
  3. Top Rated
  4. Latest Comments
  • Michael A
    Why they do not shut down the company that provides the faulty patchwork systems that make such malware first possible? No, not because of a faulty ...

    Read more...

     
  • Moubreb
    The people at any router between You and facebook can read Your communication if: 1. You're using an http: connection 2. A fake facebook certificate ...

    Read more...

     
  • theoctagon
    You could always just use what's already baked in: Android Device Manager. https://www.google.com/android/devicemanager

    Read more...

     
  • Michael A
    AFAIR the patch was available one day after the discovery of heartbleed. That normal with Free Software. Only mislead users of commercial scrap have ...

    Read more...

next
prev

Quick Search

Powered by Liquidtroll
Prev Next

How to run DOS programs in a current version of Windows

27-04-2014 Hits:1088 How To Vasia L. - avatar Vasia L.

How to run DOS programs in a current version of Windows

The big question is: Does your new PC run the 32- or 64-bit version of Windows 7 or 8? If you have the 32-bit version (referred to as x86 for historical...

UK government publishes Cyber Essentials framework

10-06-2014 Hits:1327 Security Vasia L. - avatar Vasia L.

UK government publishes Cyber Essentials framework

The Cyber Essentials scheme has formally been published by the Department for Business, Innovation & Skills and the Cabinet Office, with the final item, the Cyber Essentials Summary, Requirements and...

Apple rumored to unveil iOS 8 at WWDC in June

05-05-2014 Hits:1197 Apple Vasia L. - avatar Vasia L.

Apple rumored to unveil iOS 8 at WWDC in June

We are expected to see Apple unveil its next iteration of iOS at its Worldwide Developers Conference (WWDC) in June, but what exactly should we expect? Rumor has it that we...

The variants of Flame malware are still active and dangerous

19-09-2012 Hits:1924 Security Panagiotis K. - avatar Panagiotis K.

Four months after the revelations about the Flame malware, researchers released new information about this digital threat, which seems to be active since 2006. Kaspersky, in cooperation with international organizations and...

A Malware that lives exclusively in the computer's RAM

19-03-2012 Hits:3090 Security George Q - avatar George Q

A Malware that lives exclusively in the computer's RAM

Researchers from Kaspersky Labs have identified an unusual type of malware that is of particular interest.  It is a trojan which is a fundamental innovation which is not installed on the...