Archives
Sign In

You are seeing this because you have not yet updated your iBlog. Click on settings to edit...

Sign InSign Up
Quick Discuss
Recent Comments
23
Jul - 15

RCSAndroid - one of the most professionally developed and sophisticated Android malware

Trend Micro researchers found that among the leaked files is the code for Hacking Team’s open-source malware suite RCSAndroid (Remote Control System

1
20
Jul - 15

Boeing subsidiary Insitu would like to be able to deliver spyware via drone

There are lots of ways that government spies can attack your computer, but a U.S. drone company is scheming to offer them one more. Boeing subsidiar

0
17
May - 15

Mobile Spy Software Maker mSpy Hacked

mSpy, the makers of a software-as-a-service product that claims to help more than two million people spy on the mobile devices of their kids and part

0
1
Feb - 15

Critical “Ghost” Remote Code Execution Vulnerability

In some PHP-applications revealed the potential exploitation of critical vulnerability GHOST (CVE-2015-0235), which allows to organize code execution

1
16
Jan - 15

Awful things are what happens

Awful things. Awful things are what happens. Join us for the fun!Popular sites for downloading applications spreads malware!Why We Hate Recommending S

0
24
Oct - 14

Four in 10 Americans face regular online fraud attacks

Microsoft offers four primary tips to help protect users from identity theft:• Be selfish and defensive with personal information by not sharing sen

0
16
Oct - 14

The Zero-day vulnerability CVE-2014-4114 impacting all versions of Microsoft Windows

New Microsoft Windows Zero-Day Vulnerability - CVE-2014-4114On Tuesday, October 14, 2014, iSIGHT Partners - in close collaboration with Microsoft - a

0
9
Jul - 14

The NSA Gets an OK for Telephony Metadata Collection Yet Again

As much as we’d like to forget about the National Security Agency (NSA) and its mass surveillance program, it seems that there is no distracting our

0
2
Mar - 14

Yet another wave of digital destruction is coming

Malware fever keeps on raging, taking sophisticated forms to wreak havoc around the worldwide web. Even if your system is guarded thoroughly, you are

1
13
Jan - 14

Internet Monitoring and Brand Protection

A review of the past 10 years in cyber security opened our eyes here at Massive. Reflecting on over 50 international security conventions, hundreds of

0
20
Nov - 13

Computer Threat 3rd Quarter 2013 McAfee Report

McAfee Labs today published its quarterly report on the latest threat tendencies – review the details to get a generous portion of statistics and nu

0
23
Oct - 13

NSA: The Future Of Cloud Computing In U.S.

NSA security breach has posed a great question mark on cloud security. Is it a real secure scenario at the data centers of just hype? Every techn

0
15
Oct - 13

The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail

In June, President Obama said the NSA’s email collecting program “does not apply to U.S. citizens.”The newspaper The Washington Post reports to

0
23
Sep - 13

New Intel Chips Contain Back-Door Processor

New Intel Chips Contain Back-Door Processor, Hackable Even When Computer is Turned Off According to unconfirmed reports, the Intel Core vPro proces

0
17
Sep - 13

New Version of ESET Social Media Scanner

New Version of ESET Social Media Scanner in BETAESET®, the global leader in proactive digital protection with a record of 10 years consecutive VB100

0
16
Sep - 13

Trend Micro warns of new spam campaign

Attackers sends out to users letters about voicemail in WhatsApp.Experts of Trend Micro encountered samples of spammed messages that were supposedly W

0
16
Sep - 13

FBI Admits It Controlled Tor Servers

FBI Controlled Freedom Hosting Tor ServersThe FBI has admitted to taking control of Freedom Hosting servers on the anonymity network Tor right before

0
16
Sep - 13

Latest Java update will block exploits

Latest Java update includes tool for blocking exploitsIn the latest Oracle's developers update Java SE Development Kit (JDK) version 7 has been added

0
15
Sep - 13

Microsoft starts iPad buyback to boost Surface tablets sales

American multinational corporation Microsoft has launched a US marketing offer that will let people exchange 'gently used' iPads for Microsoft produc

5
15
Sep - 13

Best Cell Phone Monitoring Software 2013

Cell phones make life more convenient.  While cell phones are invaluable resources, they can sometimes be problematic. Cell phones for kids and o

0
14
Sep - 13

Modern Internet security threats

Computers, laptops and even smartphones are constantly exposed to different malicious programs aimed at causing various damages to the system. Compu

1
13
Sep - 13

Banking Trojans disguise attack targets in the Cloud

G Data found a new configuration of the banking Trojan ZeuSCloud-Technologies are popular and widely spread – whether for storage of data, rented co

1
12
Sep - 13

VIPRE Antivirus is the best anti virus protection that doesn't slow down your PC

If you would like antivirus which scans effectively, just go for VIPRE Antivirus. This software is generated by GFI company. Its main work is to prote

3
11
Sep - 13

18.5 million most popular websites contain malicious content

Securi company conducted a study according to which nearly 2% of world's most popular websites are malicious.Almost 2% of the most popular sites in th

0
11
Sep - 13

PHP script supports four types of DDoS attack tactics

This script uses compromised servers and supports four types of DDoS attack tactics.Earlier this year, the organization US-CERT has released a notice

0
Load More
Invite
What iBlog