Browsing Category
Security
How to recover encrypted data from viruses with No More Ransom
An initiative created by legal authorities and security signatures explains simply how to behave in case of ransomware attack suffered on your system.
In recent months, we have witnessed a considerable growth of the phenomenon of…
How to register safely on a web site
The Internet has become the future now. Unfortunately, the Web threats are many, and you lurk everywhere, especially in sites that require registration. The risk is that of being able to be robbed of all the data and codes of credit cards,…
How to manually remove virus W32.Blackmal.E@mm from the Windows system
One of the most damaging viruses to our computer is what is called a scavenger red light. The third day of every month is activated and starts to delete all the files on your hard drive. His name is W32.BlackMal.E@mm, better known as the…
How to defend themselves from Phishing
For Phishing is a type, among many, of computer scams made via web through which an attacker, woman or man who can be fooled into believing the victim to provide sensitive personal information.
It is an illegal activity that uses a…
How to choose your password
The use of the Internet and its many services, such as email, social networks, chat, forum, home banking, electronic payments and online commerce, all require you to enter a password. This, if it is not secure enough, can be easily…
Platinum: The hacker group that crazy Microsoft
The Microsoft security researchers are hunting for a group of hackers who have long work against NGOs and intelligence agencies, hiding their tracks and using a feature found in some versions of Windows.
The Windows Defender Advanced…
FireFox: Vulnerability can be shared between the extensions
Extensions for Firefox are not isolated: an add-on written specifically could exploit the vulnerabilities of other extensions to conduct attacks with high probability of success.
NoScript, Firebug and other popular Firefox extensions can…
Petya: New ransomware is installed on the boot record and locks the hard drive
A new ransomware is able to take root in the MBR system and prevent it from starting. To protect themselves simply run the usual procedures.
We have said many times, the ransomware are probably the moment of malware. The reason is…
USB Thief: A new invisible malware that steals information
It spreads via USB drives and has a self-protection mechanism that makes the identification extremely difficult. The Thief USB malware seems more a precision instrument that a threat broad spectrum.
Discovered by security researchers a…
Million at risk Android smartphone: New exploit for Stagefright
A recent NorthBit report highlights a new vulnerability of Stagefright, the component of the Android operating system that had been much talked about in the course of 2015, for similar security problems.
Stagefright returns to be talked…
AceDeceiver: The trojan on iOS that bypasses DRM Apple and infects iPhone and iPad
It has been seen in China a new malware can also infect non-jailbroken devices. It's called AceDeceiver and according to the company that has discovered. It can be up to other countries of the world.
Many of the decisions taken over the…
Adobe Flash: New critical vulnerabilities, you must install the update
Adobe releases security updates that fix critical vulnerabilities in Flash Player and AIR. One in particular, has already been exploited by hackers to pull off targeted attacks.
Adobe Flash back to talk about himself and, unfortunately,…
Cryptovirus alarm for the first time on OS X: Here is how to defend against KeRanger
The version 2.90 of the app Transmission (BitTorrent client), for OS X becomes a vehicle for spreading ransomware " KeRanger " a cryptovirus which makes hard disk inaccessible, demanding the payment of a ransom to regain possession of the…
11.5 million websites vulnerable DROWN: Required to update web server
DROWN is a new attack that endangers encrypted connections between client and server. also vulnerable, but not limited to, sites and webmail protected by HTTPS and TLS who use OpenSSL. But the fix is already available.
More than 11…