Brief Introduction To Bitcoin Ransomware

For those readers unfamiliar with the concept of Bitcoin ransomware, we should take the time to briefly explain what this phenomenon is all about. Whenever a computer is affected by ransomware, nearly all necessary files will be locked – or encrypted – with a particular password. The end user has no idea what this password […]

Is 802.11 ac Ready and Are You Ready for It?

802.11 ac is the latest wireless networking standard, one that promises to deliver faster throughput and better range than 802.11 n. Currently, 802.11 n can deliver up to 450Mbps per band (2.4 and 5GHz) theoretically, for a total rate of 900Mbps. 802.11 ac is engineered to deliver 500 Mbps per band– or 1GBps total, with […]

Send Encrypted Emails Through Gmail Using a Chrome Extension

Messages are encrypted & decrypted within the browser, so your message is only seen by you & the person to whom it is sent, and the messages stay encrypted in both the sender’s & receiver’s e-mail inboxes The messages also automatically die after a random amount of time. Do you need to send sensitive information […]

3 Apples Changed the World

Three apples changed the world: Adam and Eve’s forbidden apple, Newton´s apple and finally, Steve Jobs’ Apple. There is no doubt he made a monsterous impact in today’s world. With his vision and marketing skills, Apple Inc. started the consumer computer market in 1979. Since then, Apple with Steve Jobs at the helm has dramatically […]

Five Signs Your Android Device is Infected With Malware

By Max Eddy The antivirus and security company Bitdefender released a list of five symptoms that might indicate a malware infection. Do any of these sound familiar? Racked-Up Phone Bills Last year, the SpamSoldier malware introduced the world to the first mobile SMS botnet. Designed specifically to spread to other phones using SMS messages, SpamSoldier […]

Wi-Fi Key-Cracking Is Happening Now

In China, sales are going crazy for network key-cracking kits that will crack long-known weaknesses in a Wi-Fi encryption standard. Sales are focused on the average consumer to gain access to unsuspecting networks. The kits consist of a Wi-Fi USB adapter with a Linux OS, key-breaking software, and an easy-to-follow user manual. It is being […]

Second Hand Hard-Drives Contain Personal Data

A newly published study by Britain’s data protection regulatory agency found that more than one in 10 second-hand hard drives being sold online contain recoverable personal information from the original owner. “Many people will presume that pressing the delete button on a computer file means that it is gone forever. However this information can easily […]

6 Ways To Secure Your Dropbox Account

Dropbox is a hugely popular cloud storage service beloved by plenty of people. Regrettably, it has had a history of security issues, ranging from compromised accounts to one time allowing access to every Dropbox account without requiring a password for several hours. If you are using or going to use Dropbox, there’s a number of […]

Blackmail software: How low can they get?

A new type of malware infects PCs using file-share sites and publishes the user’s net history on a public website before demanding a fee for its removal. This bit of software has been linked to a Japanese based group which created malicious software for profit. It installs itself on computers automatically using a popular file-sharing […]

FTC Cracks Down on Fake Tech Support Firms

The Federal Trade Commission announced a worldwide crackdown on firms running bogus technical support scams that targeted victims in the U.S. and five other countries. “These scam artists we’re talking about today have taken ‘scareware’ to a new level,” said FTC Chairman Jon Leibowitz, who estimates the schemes have cost consumers “tens of millions of […]