Monday, June 1st, 2015
Go online for five minutes. Visit a few webpages. How many pictures do you see?
With the media rich nature of the web, chances are your answer is in the hundreds. It is in this space the future of malicious cyber attacks could be embedded. In a presentation at Hack In ...
Posted in Internet, Privacy, Security | No Comments
Thursday, May 28th, 2015
Hola is a popular virtual private network (VPN) provider that is available for various web browsers including Google Chrome, Mozilla Firefox and Internet Explorer, as well as desktop and mobile operating systems.
It is free to use and if you check ratings and users on Chrome's Web Store alone, you will ...
Posted in Internet, Privacy | No Comments
Saturday, May 23rd, 2015
In response to the threat of intelligence agencies like NSA and GCHQ, Security researchers from American and Israeli academics have developed a new advanced Tor client called Astoria specially designed to make eavesdropping harder.
Tor (The Onion Router) is the most popular anonymity network that is intended to allow a user to browse ...
Posted in Internet, Privacy | No Comments
Friday, May 22nd, 2015
If you sell or gift your old Android phone to someone, is it enough to do a factory reset to wipe all your sensitive data? And if your Android gets stolen, how sure are you that your anti-theft solution will do a good job wiping it and/or locking the device?
Consumers ...
Posted in Internet, Mobile, Privacy, Security | No Comments
Thursday, May 21st, 2015
You've been hit by ransomware and you don't know what to do?
Jada Cyrus has assembled a helpful "Ransomware Removal Kit" which contains decryption tools for CryptoLocker, CoinVault, TeslaCrypt and FBIRansomWare, along with instructions on how to use them.
"You should never pay the ransom. This will only reinforce this type of ...
Posted in Internet, Privacy, Security, Windows | No Comments