Free Tools To Secure Windows Against Malware

Saturday, June 6th, 2015

Everyone wants a secure operating system. No one likes to have a computer infected with malware that slows down the PC, destroys files or steals sensitive information. Often, that operating system isn't very secure by default. If it's also a highly popular OS, such as Windows, then more tools are ...

How to turn on two-factor authentication on over 100 popular online services

Thursday, June 4th, 2015

TeleSign launched Turn It On, a new campaign featuring a guide to two-factor authentication and providing step-by-step instructions for turning on 2FA for over a 100 popular social networking, banking, cloud computing and other online services that offer the 2FA option. “The number one tip most experts give for increasing account ...

New exploit leaves most Macs vulnerable to permanent backdooring

Tuesday, June 2nd, 2015

Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction. The attack, according to a blog post published Friday by well-known OS X security researcher Pedro Vilaca, affects ...

New Stegosploit Tool Hides Malware Inside Internet Images For Instant Drive-by Pwning

Monday, June 1st, 2015

Go online for five minutes. Visit a few webpages. How many pictures do you see? With the media rich nature of the web, chances are your answer is in the hundreds. It is in this space the future of malicious cyber attacks could be embedded. In a presentation at Hack In ...

Beware: Hola VPN turns your PC into an exit node and sells your traffic

Thursday, May 28th, 2015

Hola is a popular virtual private network (VPN) provider that is available for various web browsers including Google Chrome, Mozilla Firefox and Internet Explorer, as well as desktop and mobile operating systems. It is free to use and if you check ratings and users on Chrome's Web Store alone, you will ...