Articles

Warning: a Mac-targeting ransomware detected in the wild

24 February, 2017
0

If you are using a device with a Mac operating system, we have bad news for you: a novel ransomware variant was discovered to target them. Most of crypto-viruses are…

 

60% of Americans assume that they are immune to cyber attacks

23 February, 2017
0

Blumberg Capital initiated a State of Cybersecurity survey, focused on finding out the way Americans evaluate their knowledge about hacking, potential dangers and their general opinion on this topic. After…

 

Python and Java have the capacity to smash firewalls

22 February, 2017
0

Certain vulnerabilities in Python and Java have been detected and they can help crooks defeat firewalls that computer owners might have built to protect themselves. Bugs that are present in…

 

Is an Email Fake or Valid? How to Tell the Difference

21 February, 2017
0

Fake email remains one of the most popular way to distribute viruses or obtain users private and sensitive information. However, it is really simple to tell the difference between legitimate…

 

The return of TeamSpy and its malicious plan to influence TeamViewer

21 February, 2017
0

TeamViewer is a popular program, identified as a remote access software. Speaking more broadly, it is meant to connect two separate devices so one could gain access over the other…

 

Google discloses information about vulnerability in Windows operating systems

20 February, 2017
0

Project Zero is a name, used to refer to security researchers that are working for Google. The main objective of this group is to discover zero-day vulnerabilities in various software…

 

Security Flash News from the 13th to 17th of February, 2017

20 February, 2017
0

We all know Google Play Store and its main purpose: to distribute applications. On Monday (13th of February), we had the privilege to learn that Google had decided to draw…

 

Yahoo warns its user community about fabricated cookies

17 February, 2017
0

Yahoo has a reputation of not handling its business with enough respect to its users. A couple years back, you can recall, the company intentionally failed to disclose about major…

 

Secure application for messaging - Signal

16 February, 2017
0

If you don’t already know or use it – Signal is probably one of the safest messaging application that is compatible both with Android and Apple OS. It gained its’ acknowledgment…

 

From Adobe with love: update for Flash Player

15 February, 2017
0

While the world is intoxicated from the spirit of rose petals, chocolates and heart-shaped stickers, Adobe company rose above all of this commercialized holiday and attempted to distract people with…

 

Water and ransomware: how are they related?

14 February, 2017
0

PLC… what? Have your ever heard of programmable logic controller (PLC)? It is an industrial digital computer, developed to manage manufacturing processes. A cunning student from Georgia Institute of Technology…

 

Google Play Store is about to be more selective

13 February, 2017
0

Google Play Store is where tons of entertaining, educational, handy applications collide and are available for purchase/free download. Even though thousands of promoted software apps are highly-appreciated and their provided…

 

Security Flash News from the 6th to 10th of February, 2017

13 February, 2017
0

Monday sets a tone for the whole week. On Monday (the 6th of February), our attention was directed to Locky and Kovter: two buddies that decided to help each other…

 

Macs are exposed to malicious Macros in Word documents

10 February, 2017
0

Are Mac devices born to be infection-free? Devices with Windows operating systems are the top-targets for hackers. In the meantime, Mac OS X users are imagining themselves as unconquerable and…

 

Technical Support Scams, be aware

9 February, 2017
0

Technical Support scams are not obscure or mysterious: they are quite handily explainable, since their strategies are not novel. Cold-calls were a popular scam to trick people: in different countries,…