Archive | Security

Computer security has always been important, but the rise of the Internet and the global Internet community have made it more pressing than ever. New threats have emerged with the Internet, including phishing attacks that spread via email, computer worms that replicate over the Internet, a new bread of trojans that take over a computer to include it in a bot network that is used for malicious activities, and spam and viruses are all threats that Internet users encounter these days.

We cover security updates when they are released for major software including Microsoft Windows, plugins like Java or Adobe Flash, and web browsers like Google Chrome or Firefox. In addition, we are also reporting about services, online and offline, that help you protect your systems against security threats, and post tutorials that explain how to recover a system when it has been successfully attacked.

ddeauto word security

There is a vulnerability in DDE in Office applications currently that is exploited actively in the wild. DDE, or Dynamic Data Exchange, is a feature of Microsoft Office that is designed to give applications the ability to exchange data between each other. You can use DDE for instance to update a table in a Word […]


krack attacks

Researchers have discovered a flaw in the Wi-Fi standard that attackers may use to eavesdrop on wireless network traffic even if WPA2 is used for protection. Key Reinstallation Attacks, or Krack Attacks, work against all Wi-Fi networks protected by WPA2, and may in some cases be used to inject and manipulate data as well. The […]


differences patches windows 10 8 7

Microsoft's focus on Windows 10 in regards to security puts users who run devices with older but still supported versions of Windows at risk according to Google Project Zero researcher Mateusz Jurczyk. The researcher noticed that previous versions of Windows -- Windows 7 and 8.1 to be precise -- were affected by the vulnerability described […]


payload security

Payload Security is an online service that analyzes files in virtual environments to determine whether they are potentially malicious in nature. It can best be describes as a free analysis environment on the Internet that runs the selected file through a series of tests that include, among other options, running the file in a virtual […]


ccleaner 2nd payload

A new report by Cisco's Talos Group suggests that the CCleaner hack was more sophisticated than initially thought. The researchers found evidence of a second payload during their analysis of the malware which targeted very specific groups based on domains. On September 18, 2017 Piriform reported that the company's infrastructure distributed a malicious version of […]


ccleaner 5.35 digital signature

Piriform, the company behind the highly successful Windows cleaning software CCleaner, released version 5.35 of the application on September 20th, 2017. The new version was signed with a brand new digital signature, the only change of the release. The company's infrastructure was attacked successfully recently, and a modified signed version of CCleaner was distributed for […]


Piriform, makers of the popular file cleaner CCleaner, confirmed on Monday 18th, 2017 that hackers managed to attack the company's computer network successfully. The hackers compromised two versions of the CCleaner in the attack which have been used by up to 3% of the company's user base. The affected versions are CCleaner 5.33.6162 and CCleaner […]


dr web livedisk

Dr.Web LiveDisk is a free tool for system administrators and users alike to restore non-booting Windows computer systems. The program has been designed specifically for situations where malware attacks, or the disinfection, cause Windows devices from booting properly. The system repair software is offered an ISO image that you can burn to a blank CD […]


kaspersky free antivirus

Kaspersky announced the worldwide rollout of Kaspersky Free, a free limited version of Kaspersky Internet Security, yesterday. We reviewed the initial version of Kaspersky Free back in 2016 when Kaspersky began to distribute it in selection regions. While the security program was released only in those regions, downloads were not restricted to them. Kasperksy plans […]


bitdefender 2018 interface

Bitdefender released a refresh of the company's Bitdefender product line yesterday that improves it in several key security areas. Bitdefender Total Security 2018, Bitdefender Internet Security 2018 and Bitdefender Antivirus Plus 2018 are all available already on the Bitdefender website. Existing users may download the new versions from Bitdefender Central to install the new version […]


bitdefender home scanner

Bitdefender Home Scanner is a free program by security company Bitdefender that scans devices on local networks for security issues. The need for security has expanded with Internet of Things being a trend, and household devices such as your fridge or thermostat connecting to a local network or the Internet. It is no longer sufficient […]


kaspersky virusdesk

Kaspersky VirusDesk is a free service by Russian security firm Kaspersky that enables you to scan files or links for viruses and other threats. While most computer users would probably agree that having a resident antivirus solution installed is a must in these days and age, especially on Windows, there is little to argue about […]


travel mode enabled

AgileBits, makers of the 1Password password manager, introduced a new Travel Mode feature in recent versions of the program for paying customers. This new mode hides password vaults when you enable it, so that they are not revealed when someone opens the passwords in the application. Traveling internationally with electronic devices can be an unpleasant […]


keylogger hp

Fresh from Switzerland comes a report from security firm modzero AG about a keylogger in audio drivers of certain HP devices. The keylogger is built-into the driver, records all keystrokes made by users of the system, and saves them all to a logfile MicTray.log in the C:\Users\Public\ of the computer system. Note that the log […]


intel vulnerability

A recently disclosed vulnerability in Intel products using Intel Active Management Technology, Intel Small Business Technology, and Intel Standard Manageability gives attackers remote access to the manageability features supported by these products. First the good news: the vulnerability does not affect (most) consumer PCs with Intel consumer firmware. These technologies have been created by Intel […]


are you identifiable

Are you identifiable is a new web service that answers whether Internet sites may identify you based on your extensions, logins, and web browser. Online privacy is a hot topic, and making sure that you you are not tracked or traced online may soon require a master's degree in privacy. New technologies, the rise of […]