Computer Kidnappers And How To Avoid Them.

If you have been following the news lately, you will be aware of a type of malicious software known as ransomware that is doing the rounds. Aptly named ‘Locky” it encrypts the files on your computer and will in essence ‘kidnap’ them and not release access to them until you pay a ransom to the hackers. Computer Kidnappers 101 Locky Ransomware - How Does It Spread? Hackers or 'Computer Kidnappers'  release Locky Ransomware onto unsuspecting victims' computers. This ransomware is spread Continue Reading

Easy Clean PC

Easy Clean PC: Does It Work? And Is it Safe? There has been much discussion in our community the last few weeks about Easy Clean PC. Easy Clean PC is popular PC optimization program. It is software specifically designed to ‘clean the Windows registry of a computer’ and if used regularly, to ‘assist with increasing the system performance and speed’. We created this post in order to provide our members with feedback on this software and address the main questions we have seen. Does it Continue Reading

Turbo Clean PC

Due to recent popularity and discussions in our community about Turbo Clean PC, we decided to publish a page to provide some feedback on this popular optimization software program. Is Turbo Clean PC Safe? To determine if Turbo Clean PC is safe we sent it to our testing lab. Our lab uses a variety of computers with different operating systems. Additionally, our lab checked how easily it can be uninstalled from the computer and if it left any harmful files behind.  After a lengthy Continue Reading

Android Security – Malware Threat

Android Security Faces Huge Malware Threat             During the rise of the technological advancement, it has been evident that work has been made easier, communication became faster as time went buy, and information has been readily accessible to almost everyone with just a few punches on our laptops.   However, nobody really noticed that some people are starting to abuse the advancement of technology against the security. In the words of Andrea Lelli, Symantec Senior Software Continue Reading

Study Findings Inspire Privacy Protection iOS App

In a recent study done by computer scientists from the University of California in San Diego, it was discovered that close to half of the number of Apple iOS applications have access to the unique identifier about the devices where they were downloaded. With that information, application vendors and advertising networks can determine the behavior of the users from variety of applications in their device, which includes iPads and iPhones. In fact, some apps have the power to associate the Continue Reading

Windows 8 Security Threat

Great power has its perks, but it also has a catch. In the case of Windows’ early versions, it may have indeed been considered as the most dominant operating system platform when it encouraged open development to developers. However, opening their system for developers to extend and build on Windows opened it to some serious security threats. Windows may have gotten the number one spot on the list of the world’s best operating systems, but since they allowed developers to practically do Continue Reading

Federal Reserve Infiltrated By Anonymous

A group of hackers who collectively call themselves as Anonymous has been involved in a string of security attacks on US Government Agencies. Recent victim of these attacks is the Federal Reserve website. From one of its internal website, personal Information of 4,000 US bank officials were reportedly stolen from its server. The hackers' publication has revealed information such as names, email addresses, contact numbers and even login credentials. The Federal Reserve has toned down the Continue Reading

Potential Security Risk with Transport Layer Security (TLS) Protocol

Internet applications like Facebook, online shopping and online banking are now part of our daily routine. To save time and minimize effort, most of our transactions or communications are done online. Most of us are enjoying the benefits of online activities but at the same time are also aware of the possible dangers that come with it. As much as we try to be responsible and careful, there will always be someone or something that would compromise the whole system. Let us take Transport Continue Reading

Botnet: A Lone Cyber Criminal’s Greatest Ally

When people hear the word "hacker", they generally associate it with the idea that they are all shadowy individuals that are brilliant with computers and try to break into government facilities on a daily basis. For the most part though, what many people would call "hackers" are just regular people like you and me. Alone, most hackers have a hard time with some malicious activities. It's extremely difficult to shut down a website on your own for example. This is why, in most cases, you don't Continue Reading

New York Times Hacked By The Chinese

Hackers from China reportedly broke into the system of The New York Times. This was after an article about the immense affluence of the relatives of Chinese Premier Wen Jiabao was published on October 25th, 2012. Consecutively, the Wall Street Journal also came out to report the same incident as well as Bloomberg. The New York Times was the first to write on the Chinese Premier's personal wealth which would be considered as controversial given the poverty rate in China. Many Chinese citizens Continue Reading