Monthly Archive: September 2014

CYBER NEWS
facebook-ad-platform

Users Tracked by Brands Through the New Atlas Ad Platform on Facebook

Facebook has launched a brand new ad platform called Atlas. The aim of this platform is to allow brands to track the users around the web and not only on Facebook. This means that Facebook now knows more about the…

THREAT REMOVAL
cryptowall-ransomware

Top Websites with CryptoWall Threat via Malvertising Campaign

Five of the top-ranking websites were recently attacked by CryptoWall that was archly delivered through a Malvertising Campaign. In the beginning the antivirus engines failed to detect the threat and thus, the five websites were displaying advertisements that were redirecting…

CYBER NEWS
vawtrak-malware-is-back

Vawtrak Malware with New Targets

It seems like eliminating a Trojan in this day and age is a rather impossible task. Analysts at Phishlab report that a malware piece that was active in the mid-2000s, Vawtrak, is back on the field. What Has Been Vawtrak…

CYBER NEWS
OS X-safe-against-bash-flaw

Mac OS X Safe Against Bash

Apple announced that all users of Max OS X should feel safe concerning the serious bug that was discovered in Bash. In a statement, the company confirmed that the majority of Apple users are not at risk and further stated…

CYBER NEWS
Linux and Mac Computers Hijacked

Bash With a Bug, Many Linux and Mac Computers Hijacked by Attackers

A very serious bug was discovered in Bash, a much popular command interpreter, posed a serious security risk to the Linux and Unix systems. According to the security experts, this problem should not be regarded as a server issue and…

CYBER NEWS
yahoo

Government Data Requests Dropped, Yahoo Reports

The personal information of the users that has been collected by companies such as Facebook and Google has turned them into targets for the intelligence agencies and governments looking for information. At the same time, however, the number of the…

REVIEWS
basic-software-windows

Basic Software Programs for Windows Users

Among the many programs and applications that a user can download for free or purchase from a licensed developer, there is a bare minimum of programs needed for the proper work of any Windows PC. Here is a list of…

CYBER NEWS
iPhon-6-plus-bending

Is That an iPhone 6 Plus Bending in Your Pocket?

The owners of the new iPhone 6 Plus are already complaining about it. When wearing the new iPhone model in their trouser pockets, some owners were unpleasantly surprised that it bends. A few days after the release of iPhone 6…

CYBER NEWS
how-tor-browser-works

Tor Browser Allows Users to Surf the Web Anonymously

Several sources, among which the websites BoingBoing and PCworld, have recently published articles about librarians from Massachusetts installing the software Tor on all public PCs they have in order to allow their patrons use the web anonymously. The librarians are…

CYBER NEWS
DDoS attack methods

Frequent DDoS Attacks Against Gaming Sites

A worrisome trend has been spotted recently of continuous DDoS attacks. After the Lizard Squad attack against Destiny and Call of Duty servers, the researchers confirmed a high volume of attacks that happened in the first six months of 2014.…

CYBER NEWS
Kyle & Stan With Bigger Reach

Kyle & Stan Malvertising Network With Bigger Reach

Current situation The researchers had an unpleasant surprise two weeks ago, after the release of the first Cisco report concerning the malicious ad distribution campaign, according to which the malvertising network of Kyle and Stan has approximately nine times bigger…

THREAT REMOVAL

Ransomware Infections & the Users’ Options

The editor of Dark Reading Tim Wilson recently raised an provocative question in a comment he placed on the blog of Sara Peters, named “CryptoWall More Pervasive, Less Profitable than CryptoLocker”. Mr. Wilson provoked the security experts to share their…

HOW TO

How to Disable Autoloaders in Windows 7 and Windows 8

There is no direct connection between the different programs which get loaded as you boot and the various processes that slow down your computer a few hours later. Many programs that get automatically loaded when you boot fulfill their task…

HOW TO
How-to-Convert-PDF-To-Word

Converting PDF files to Word Document files

The converting of PDF files to Word Document files is important to many people , who have many different reasons for that. The conversion is possible, so let us see how it can be done. The PDF files are files…

HOW TO
effective online tools for writers

Top Online Effective Tools for Writers

Writers know that the best device they can use in order to write a good text is their brain, which through the voice and the fingers could result in an excellent piece of work. Living in modern world today however,…

CYBER NEWS
home depot teaching kids to build

Security Breach at Home Depot exposing more than 55 million credit cards

Home Depot suffered a security breach, which exposed at risk the users of 56 million unique credit cards. The hackers’ attacks and the malware have been dealt with according to information offered by the company. The malware was present in…

REVIEWS
13 TIRANIUM_ANTIVIRUS_2014_TEST_2

Is Your Antivirus to be trusted? / To Trust or Not to Trust Your Antivirus

Earlier this year the malware researcher Neil J. Rubenking published a review concerning Tiranium Premium Security 2014. After the review was published, he got a message from a user claiming that Tiranium abused different online websites associated with malware checks…

CYBER NEWS
browser-disabled

Android Browser with a Flow Attacking User’s Privacy

What Is the Android Browser Security Bug Android Security Bug has been found by the independent security researcher Rafay Baloch and is affecting 50 % of the Android users. The security bug has been found in the Android Browser app,…

CYBER NEWS
kindle-bug

Malicious Kindle Ebooks Help Hackers Access Amazon Accounts

The feud between book lovers about paper and electronic devices is constantly growing. If you are among the ones preferring to enjoy their read on a mobile device, you should be a bit more careful. Kindle Ebooks Injected with Malicious…

CYBER NEWS
malicious-email

Giveaways of a Malicious Email

Warning! This Email Is Malicious! Nowadays emails get proper spam filtering. Not long ago it was a lot easier for spam email to end up in your inbox. Luckily this is history now, especially if you use Gmail. Keep in…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree