Latest articles tagged “security”
Microsoft Updates Security Software to More Effectively Block Adware
by Chris Thomas
on 9 April 2014
·
1936 views
Earlier this week Microsoft announced that it would be updating its security software by tightening the criteria used to classify applications as adware. ... Read more
Encryption security bug Heartbleed affects two thirds of the Internet, including Yahoo
by Dan Vlasic
on 9 April 2014
·
3633 views
It is catastrophically bad, just a hugely damaging bug, experts say, betting there will be a lot of vulnerable servers a year from now. This won’t get fixed. ... Read more
Virus Shield App for Android May Be the Biggest Google Play Store Scam To Date
by Chris Thomas
on 8 April 2014
·
2099 views
This week we saw one of the most prolific Android app scams to date when a developer known as “Deviant Solutions†released an app called “Virus Shield.†... Read more
DropBox Is Now Automatically Scanning Files to Look for Copyright/DMCA Violations
by Chris Thomas
on 7 April 2014
·
5233 views
DropBox has apparently begun scanning all shared files to see if they match up against previously hashed files that have been subject to DMCA (Digital Millennium Copyright Act) takedowns. ... Read more
Yahoo Releases Data Encryption to Win Back Users’ Trust
by Dan Vlasic
on 4 April 2014
·
1919 views
In the wake of Snowden revelations, Yahoo aims to make data encryption the default for all Yahoo traffic. ... Read more
Google Report: 80% of News Outlets Targeted by Governmental Spy Agencies
by Dan Vlasic
on 3 April 2014
·
4257 views
Two Google security engineers released a report where they reveal some drastic statistics. Four fifths of the international top media outlets, including the Guardian, are the target of government-sponsored hacking attacks. ... Read more
Android Tablet and Smartphone Security Basics
by Dan Vlasic
on 29 March 2014
·
3691 views
Yes, there are reports suggesting 99% of malicious software targets Android devices, yet there is no need to panic since there are many ways you can ensure security of your device. ... Read more
British Court Rules Information Stored Electronically Is Not “Propertyâ€
by Dan Vlasic
on 28 March 2014
·
2415 views
According to the recent ruling by the United Kingdom Court, “information stored electronically does not constitute property which someone can exercise possession of.†... Read more
Twitter Ban in Turkey Lifted By Court Order
by Chris Thomas
on 27 March 2014
·
3689 views
A Turkish court has ruled that the recent ban on Twitter imposed by the Turkish government is unlawful and against freedom of expression. ... Read more
EA Server Hacked And Used To Phish Apple ID Credentials From Unsuspecting Users
by Chad Faith
on 24 March 2014
·
2001 views
If you wanted proof that hackers are becoming progressively more ingenious every day, then let’s examine the latest stunt pulled by “Derpâ€, the group that claimed the credit for the EA server exploit. ... Read more
Beware of Google Drive Scam
by Dan Vlasic
on 20 March 2014
·
1702 views
Symantec, a Sunnyvale, California-based security company has recently discovered a phishing attempt using this pattern and posted about the incident on its blog. The scheme comes in the form of an email with the title “Documents.†... Read more
Introduction to Sandboxed Browsing
by Dan Vlasic
on 17 March 2014
·
19823 views
If you want to increase your privacy, protection and maintain your productivity levels, we suggest you take a look at sandboxed browsing. Sandboxing software adds an extra security layer when you instal new software or browse the web. ... Read more
Assange and Snowden Speak at SxSW: So True, So Ominous
by Dan Vlasic
on 14 March 2014
·
7257 views
Bottom Line – if you want privacy, become technically literate or quit using Internet. SXSW interactive usually goes by the title “Technology is Awesome!†but not this year. ... Read more
Linux Security Vulnerability Leaves Users Open to Attacks
by Dan Vlasic
on 10 March 2014
·
1944 views
Not so long ago, headlines were hit by the news of a variety of Linux distributions found to be vulnerable to attacks caused by a bug that allows perpetrators bypass various key security protocols. As a result, they are able to intercept and dissemin ... Read more
Browser Is the Weakest Link in Your Online Protection
by Dan Vlasic
on 8 March 2014
·
3979 views
Despite the titanic efforts of tech companies to make their browsers secure, they have desperately failed to do so. Microsoft’s Internet Explorer, Apple’s Safari and Google’s Chrome remain the most dangerous intermediaries in users’ online ... Read more
Stay Connected
Follow us to get the latest tech tutorials, news, and giveaways as soon as we post them.
Have a Tech Question or News Tip?
Featured Articles
Popular This Week
#news
#windows
#android
#games
#ios
#how tos
#review
#best apps
#security
#google
#windows 10
#free
#microsoft
#apple
#windows 8
#apps
#chrome
#pc
#best games
#mac
#ps4
#smartphone
#answers
#iphone
#samsung
#facebook
#update
#firefox
#xbox one
#xbox