Archive | Security

Computer security has always been important, but the rise of the Internet and the global Internet community have made it more pressing than ever. New threats have emerged with the Internet, including phishing attacks that spread via email, computer worms that replicate over the Internet, a new bread of trojans that take over a computer to include it in a bot network that is used for malicious activities, and spam and viruses are all threats that Internet users encounter these days.

We cover security updates when they are released for major software including Microsoft Windows, plugins like Java or Adobe Flash, and web browsers like Google Chrome or Firefox. In addition, we are also reporting about services, online and offline, that help you protect your systems against security threats, and post tutorials that explain how to recover a system when it has been successfully attacked.

whatsapp security notifications

Security researchers found a backdoor in the popular messaging application WhatsApp recently that could allow WhatsApp to intercept and read user messages. Facebook, the owner of WhatsApp, claims that it is impossible to intercept messages on WhatsApp thanks to the services end-to-end encryption. The company states that no one, not even itself, can read what […]


bitlocker management

If you encrypt the hard drive of a computer running Windows 7, and then on the same computer running Windows 10, you will notice that the encryption process is faster on Windows 7. Bitlocker is a built-in disk encryption program that you can use to encrypt data so that it cannot be accessed by third-parties. […]


chrome disable autofill

Most modern web browsers support comfortable features like auto-filling forms on sites using data that you have entered in the past. Instead of having to enter your name, email address or street address whenever you sign up for a new account for instance, you'd fill out the data once only and have the browser fill […]


ransomware simulator

Ransim is a ransomware simulator for Windows that simulates attacks of ten ransomware families against the computer system. Ransomware is without doubt a relatively new threat category that has gained some prominence in recent time. Security companies have added ransomware protection to their tools as a response, or released standalone programs with the aim to […]


netgear router update

Netgear has released the first batch of production firmware fixes for company routers affected by a serious security vulnerability. Cert issued a warning on December 9, 2016 that several Netgear routers are vulnerable to arbitrary command injection. Cert listed only two router models but has since then added other models to the list. Currently, the […]


avira password manager

Avira Password Manager is a new security product by German company Avira which is probably best known for its antivirus offerings. The password manager niche is crowded, and if you want to conquer it with a new product, you better make sure it is offering something unique. Avira's reputation may certainly help the company acquire […]


malwarebytes free anti exploit

Malwarebytes 3.0, released a couple of days ago, marks a big jump from the company's previous policy of releasing individual security tools. Instead of offering Malwarebytes Anti-Malware, Anti-Exploit and Anti-Ransomware as individual downloads and installations, Malwarebytes decided to integrate them all in one product. The new Malwarebytes 3.0 looks on first glance like an upgrade […]


password leak

A recent password use study by the German Hasso-Plattner-Institute of roughly 1 billion user accounts concluded that 20% of users were reusing passwords. Additionally, 27% of users used password that were nearly identical with other account passwords. User accounts and passwords are still the dominating method of authentication both locally and online. While companies work […]


malwarebytes 3.0

Malwarebytes 3.0 is a new product by Malwarebytes, makers of security software that unifies the company's main security products in a single program. Home users had the choice between three different products for Windows desktop PCs up until now: There was Malwarebytes Anti-Malware, Malwarebytes Anti-Exploit, and Malwarebytes Anti-Ransomware. The first two products were available as […]


top vulnerabilities 2016

If you needed another reason not to use Flash anymore, a new security report by Recorded Future may convince you to consider this at the very least. The company analyzed 141 exploits kits that were available between November 16, 2015 and November 15, 2016. The main takeaway of the research study is that Adobe Flash […]


bitlocker bypass windows 10

A security researcher discovered a new issue in Microsoft's Windows 10 operating system that allows attackers to gain access to BitLocker encrypted data. A post on the Win-Fu blog highlights the method. Basically, what the method does is exploit a troubleshooting feature that is enabled during the upgrade process. There is a small but CRAZY […]


windows mitigations updated

Microsoft plans to discontinue support for its Enhanced Mitigation Experience Toolkit in July 2018, and won't release a new version of EMET either. This makes EMET 5.51 the last release version of the anti-exploit security software for Windows. The reason given by Microsoft was that Windows 10, Microsoft's new operating system, includes all the mitigation […]


malwarebytes telecrypt decryptor

Malwarebytes Telecrypt Decryptor is a free program for devices running Microsoft Windows to decrypt files that are encrypted by the ransomware Telecrypt. Telecrypt is a rather troubling piece of ransomware that is distributed through various means including emails, exploits, and drive by downloads. What makes Telecrypt special is that it uses the API of the […]


keepass source audit

We reported back in June 2016 that KeePass, a popular password manager, was getting a security audit by the European Commission's EU Free and Open Source Software Auditing project (EU-FOSSA). EU-FOSSA is a pilot project to create a formal process for contributing software security reviews to open source communities. The project created an inventory of […]