VPN Chaining is a technique in which multiple virtual private network (VPN) servers are chained to improve online privacy while on the Internet. Basically, what it means is that you are not connecting to a single VPN but to multiple ones in a layered system that looks like Your PC > 1st VPN > 2nd […]
Computer security has always been important, but the rise of the Internet and the global Internet community have made it more pressing than ever. New threats have emerged with the Internet, including phishing attacks that spread via email, computer worms that replicate over the Internet, a new bread of trojans that take over a computer to include it in a bot network that is used for malicious activities, and spam and viruses are all threats that Internet users encounter these days.
We cover security updates when they are released for major software including Microsoft Windows, plugins like Java or Adobe Flash, and web browsers like Google Chrome or Firefox. In addition, we are also reporting about services, online and offline, that help you protect your systems against security threats, and post tutorials that explain how to recover a system when it has been successfully attacked.
7-Zip is a popular open source file compression program that supports all major compression formats and support for a variety of other features. Talos, a Cisco company, discovered a vulnerability in 7-Zip that allows attackers to run code on computer systems that has the same rights as the underlying process. To be precise, the vulnerability […]
While most browser makers plan to drop support for Java, Flash and other plugins such as Silverlight or Quicktime, or have stopped supporting these technologies already, there are still a lot of sites and services out there that can only be accessed if certain plugins are installed in the browser. If you take Google Chrome […]
CipherShed was one of a handful of TrueCrypt encryption software alternatives that emerged shortly after the developers of TrueCrypt dropped the software and development like a hot stone. We reviewed the initial version of CipherShed back in 2014 when the development team released a first screenshot of the upcoming interface and revealed its plans. The […]
Ransomware Removal Kit is a collection of anti-ransomware programs designed to be used by security professionals and system administrators. Ransomware takes files or the entire computer hostage and pressures the user or administrator of the device into paying a ransom to regain access to files or the system. Most security experts suggest that ransoms are […]
Trend Micro's Zero Day Initiative published two security advisories, ZDI-16-241 and ZDI-16-242, affecting Apple QuickTime for Windows yesterday. Both vulnerabilities allow attackers to execute code remotely if exploited successfully by getting users to visit malicious pages or open malicious files. Trend Micro furthermore revealed that Apple deprecated QuickTime for Windows. This means that the company […]
AVG AntiVirus Free is a longstanding security program for Microsoft Windows that protects computer systems from viruses, trojans and other malicious code. One interesting fact about AVG is that it maintains two free antivirus solutions, namely AVG AntiVirus Free and AVG Protection Free. The core difference between both products is that Protection Free offers multi-device […]
ID Ransomware is a new online service that allows you to upload ransom notes or encrypted file samples to identify the ransomware used to attack you. So-called ransomware is an ever growing and evolving threat that is attacking computer systems to either hold files hostage by encrypting them, or locks access to the computer instead. […]
Kaspersky Internet Security is a long-standing security program for the Windows operating system by Russian security firm Kaspersky. The program sits functionality-wise between the company's Anti-Virus and Total Security offerings. From a security point of view, it is offering more security features than Anti-Virus, and the same level of protective features as the more expensive […]
Bitdefender Total Security 2016 is Bitdefender's flagship security program for the Windows operating system. The 2016 version is the latest version currently, but we will update the review when the company releases updates. Bitdefender maintains a wide range of products for Windows and other operating systems. Total Security 2016 offers all features of the company's […]
There are two types of Anti-Ransomware software: those that protect the system in real-time against incoming threats, and those that disinfect the system after a successful ransomware attack. The following overview of anti-ransomware programs looks at programs that have been designed specifically for the purpose. It doesn't include general purpose security software that includes ransomware […]
Bitdefender Anti-Ransomware is a new product by security company Bitdefender to protect Windows PCs against several ransomware families. Ransomware describes a specific type of malicious software that has been designed to force users to pay ransom -- usually in the form of Bitcoin -- by encrypting data or locking the screen, and threatening users into […]
Avast SafeZone Browser is one of the components that may gets added to your Windows machine when you install the antivirus solution. It is selected by default and if you don't select the customize option in the installer to pick the modules that you want installed, will be installed on your system. Avast users on […]
The results of this year's Pwn2Own security contest are in and things are not looking good for Windows and Apple OS X, the browsers Safari, Edge and Chrome, and Adobe Flash as they have all been pwned by participating security teams. Firefox was not part of the 2016 contest because it has not "made serious […]