Monthly Archive: August 2014

CYBER NEWS

Six Effective Features of Google Drive That Users Barely Put to Work

The simplicity of the Google Drive applications is what makes them so popular among users. But don’t think that just because they are easy to operate, they do not have a great deal of power locked in them. The regular…

CYBER NEWS
Kelihos-Trojan

Kelihos Trojan Disguised as Anti-Government Software

Kelihos Trojan has been spreading by hackers, attacking Russian nationals, leading them into the belief that this is software designed to attack online resources belonging to US and Western governments. The new malicious campaign by the cyber criminals appeals to…

THREAT REMOVAL

ZeroLocker Crypto Ransomware Disguises as a Crypto-Malware Decryption Tool

ZeroLocker is a new crypto-malware ransomware program which acts in the disguise of a decryption tool which can rescue the data that is locked by the different threats, in case the license of the program is purchased. As a rule,…

CYBER NEWS
computer-slow-down

Top Computer Slowdown Myths Debunked

There are so many myths about PC slowdowns that sometimes computer users find it difficult to figure out the true reasons that cause the poor performance of their computers, so which are the top myths that are associated with computer…

CYBER NEWS
computer-security-mistakes

The Most Common Security Mistakes PC Users Should Avoid

Human beings are prone to mistakes but one mistake you want to avoid is to allow a hacker to access your computer and steal all your personal information. You can benefit from changing bad computer habits and prevent misfortunes by…

CYBER NEWS
Chrome warn harmfu software

Google Chrome with Option to Warn Users for Software That is Potentially Harmful

This week Google will launch a special Safe Browsing protection mechanism. It will be available in Chrome and will benefit from many capabilities including detection of deceptive software that aims to make undesired and unexpected changes to the computer of…

CYBER NEWS
youtube-music-key

YouTube with a Music Key for Premium Music Experience

Google now makes a new shot at the premium music service by the so called YouTube Music Key. This will be the name of the music subscription service that will be provided by Google through the YouTube channel. It will…

HOW TO
Hand typing on computer keyboard

Switching Chrome Channels and Testing New Features

The most modern and cool new features of Google Chrome are available to those users that are not afraid to test new things that are still in development and far from being officially released. The new features are available to…

HOW TO
Password Icon

Protecting Your Passwords? Mission Possible!

Protecting one’s passwords in the online world has always been important, yet today it raises even more serious questions concerning the security awareness of the users. Several days ago it was reported on the news about a cybercrime group from…

HOW TO

How to Make Your PC/Laptop Run Faster (3 Simple Steps)

Berta BilbaoBerta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.More Posts

HOW TO

How to Speed Up Any Computer – Windows 7 and 8

Berta BilbaoBerta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.More Posts

HOW TO

How To Remove Virus Without Using Antivirus Program

What is a virus? How does a virus infect a computer? How to remove virus files manually without an antivirus program? Viruses have been around ever since the first virus has been written, called “The Creeper”, first detected in the…

CYBER NEWS

What does Sensor Technology mean

What Does Sensor Technology Mean Berta BilbaoBerta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.More Posts

THREAT REMOVAL
cryptolocker

The Return of CryptoLocker Ransomware

Created in 2013, CryptoLocker is a ransomware that targets all Windows versions. Through asymmetric encryption, certain files available on the user’s PC are encrypted, and a ransom message is displayed. The sum requested for the decryption of the files is…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree