Archive | Security

Computer security has always been important, but the rise of the Internet and the global Internet community have made it more pressing than ever. New threats have emerged with the Internet, including phishing attacks that spread via email, computer worms that replicate over the Internet, a new bread of trojans that take over a computer to include it in a bot network that is used for malicious activities, and spam and viruses are all threats that Internet users encounter these days.

We cover security updates when they are released for major software including Microsoft Windows, plugins like Java or Adobe Flash, and web browsers like Google Chrome or Firefox. In addition, we are also reporting about services, online and offline, that help you protect your systems against security threats, and post tutorials that explain how to recover a system when it has been successfully attacked.

disable camera

Putting tape over the camera of a laptop or mobile device is a low-cost solution to block the camera from capturing what is happening in front of the device. The reasoning behind taping over a built-in camera of a laptop, other mobile device or desktop computer is simple: prevent anyone from using the camera to […]


utorrent forum hacked

When you open the official uTorrent web forum right now, a security advisory notifies you that forum data has been compromised and that attackers were able to download the forum user list. Users of the forum should consider passwords used on the forum as compromised even though they have not been available in clear text […]


teamviewer security

TeamViewer announced yesterday that it has started to roll out two new protective features for the popular remote desktop software. There has been lots of talk about TeamViewer's recent service outage and the increase in reports on various Internet sites that customer accounts were hacked. TeamViewer denies that the service itself has been hacked or […]


KeePass 2 update checks

A security vulnerability in the popular password manager KeePass 2 was disclosed recently affecting all versions of the password manager but only if automatic update checks are enabled. KeePass 2 ships with an option to check periodically for program updates. While update checks are performed if the feature is enabled, automatic downloads and installations of […]


vpn chaining

VPN Chaining is a technique in which multiple virtual private network (VPN) servers are chained to improve online privacy while on the Internet. Basically, what it means is that you are not connecting to a single VPN but to multiple ones in a layered system that looks like Your PC > 1st VPN > 2nd […]


7-zip 16,0

7-Zip is a popular open source file compression program that supports all major compression formats and support for a variety of other features. Talos, a Cisco company, discovered a vulnerability in 7-Zip that allows attackers to run code on computer systems that has the same rights as the underlying process. To be precise, the vulnerability […]


firefox plugins

While most browser makers plan to drop support for Java, Flash and other plugins such as Silverlight or Quicktime, or have stopped supporting these technologies already, there are still a lot of sites and services out there that can only be accessed if certain plugins are installed in the browser. If you take Google Chrome […]


ciphershed 0740

CipherShed was one of a handful of TrueCrypt encryption software alternatives that emerged shortly after the developers of TrueCrypt dropped the software and development like a hot stone. We reviewed the initial version of CipherShed back in 2014 when the development team released a first screenshot of the upcoming interface and revealed its plans. The […]


ransomware removal kit

Ransomware Removal Kit is a collection of anti-ransomware programs designed to be used by security professionals and system administrators. Ransomware takes files or the entire computer hostage and pressures the user or administrator of the device into paying a ransom to regain access to files or the system. Most security experts suggest that ransoms are […]


quicktime for windows

Trend Micro's Zero Day Initiative published two security advisories, ZDI-16-241 and ZDI-16-242, affecting Apple QuickTime for Windows yesterday. Both vulnerabilities allow attackers to execute code remotely if exploited successfully by getting users to visit malicious pages or open malicious files. Trend Micro furthermore revealed that Apple deprecated QuickTime for Windows. This means that the company […]


avg antivirus free

AVG AntiVirus Free is a longstanding security program for Microsoft Windows that protects computer systems from viruses, trojans and other malicious code. One interesting fact about AVG is that it maintains two free antivirus solutions, namely AVG AntiVirus Free and AVG Protection Free. The core difference between both products is that Protection Free offers multi-device […]


id ransomware

ID Ransomware is a new online service that allows you to upload ransom notes or encrypted file samples to identify the ransomware used to attack you. So-called ransomware is an ever growing and evolving threat that is attacking computer systems to either hold files hostage by encrypting them, or locks access to the computer instead. […]


kaspersky internet security

Kaspersky Internet Security is a long-standing security program for the Windows operating system by Russian security firm Kaspersky. The program sits functionality-wise between the company's Anti-Virus and Total Security offerings. From a security point of view, it is offering more security features than Anti-Virus, and the same level of protective features as the more expensive […]


bitdefender total security

Bitdefender Total Security 2016 is Bitdefender's flagship security program for the Windows operating system. The 2016 version is the latest version currently, but we will update the review when the company releases updates. Bitdefender maintains a wide range of products for Windows and other operating systems. Total Security 2016 offers all features of the company's […]