IT and Information Security in 2013
Although the year 2013 is coming to a close in a few months, there were still a lot of predictions coming about IT security. Before the year has started, the predictions made were far ...
Twitter verification bends to avoid most fake accounts
Twitter has begun to implement a dual system of account verification to prevent impersonation frequent, mainly media as Financial Times or the Associated Press, who spread a false ...
The Supreme guarantees that the government can decide to close a website
The ruling emphasizes that judges have the power to review and validate the implementation of punitive measures | To the court, the right to freedom of expression does not preclude ...
How to legally force a bank to withdraw your name from a joint checking account
If you have a joint checking account, both you and the other person whose name is on the account can access and use the account funds. This works well for many couples and families, ...
How to protect your account number and your credit or debit card
How to protect your account number and your credit card or debit card. To protect your account numbers be cautious when sharing with or without intention. Always know where your ...
Through Skype, a Trojan turns computers into “slaves” of Bitcoin
Kaspersky Lab experts have detected two malware campaigns that operate via Skype: in both cases, cybercriminals are using social engineering methods for users to prick a malicious link ...
Manual for cyberwar
If any physical battle has rules, why not have a manual for a cyberwar?
A group of experts have compiled all available rules and have summarized in a manual, it will appear shortly. The ...
Oracle solves another fifty holes in Java
Java is a platform that reached a high level of popularity by the possibilities when creating web applications for (among other features), but the endless security problems generated ...
Search engines and social networks are more insecure than the websites of pornography and gambling
The greatest security threats online are legitimate sites visited by large audiences as the major search engines, retail and social networking pages and not pornographic, pharmaceuticals ...
Nokia Asha decrypt HTTPS traffic from smartphones
Nokia has admitted that it intercepts to HTTPS encrypted Internet traffic to its users and temporarily decrypted. That done, but only for the benefit of customers who are not ausschnuffle. Security ...
How to prevent someone from accessing your Gmail account
Gmail has become over the years a very strong alternative to email service Hotmail (now converted into Outlook.com) and Yahoo Mail . Google has endeavored to create a flexible ...
How to log out of Gmail remotely
Gmail has become its own right in the webmail tool used the world over. platform Google has managed to gain widespread popularity in recent years, thanks in large part to its ...
He died at age 26 on cyber activist Aaron Swartz
The hacker, who apparently committed suicide, developed the web RSS and Reddit
He was accused of stealing millions of documents from the Massachusetts Institute of Technology.
The ...
Experts recommend disabling Java for security breach
The experts have advised Internet users to disable Java, Oracle software, due to a major security problem. According to them, several groups of hackers have exploited the vulnerability ...
The workaround for Internet Explorer hole serves no
A few days ago we told you about a critical vulnerability found in older versions of Internet Explorer and allows cybercriminals to control the computer remotely. The danger of ...
How I can protect my privacy on the Internet
Coincidences do not exist on the Internet. Probably finish of booking a flight or a room of hotel online , and immediately start receiving emails about travel and vacations. Or ...
Vulnerability allows sequester resources from mobile browsers
A new technique based on MapReduce could allow attackers to hijack computing resources used in cloud-based mobile browsers and use them anonymously, according to security researchers ...
Fraudsters use WhatsApp instability to spread rumor
WhatsApp users are receiving this Thursday, 29/11, a message stating that the mobile communications will be charged soon if they do not pass along the supposed notice to their contacts.
In ...
Samsung printers have secret door that allows attacks
Printers manufactured by Samsung have an administrator account (backdoor) coded in their firmware that could allow attackers to change settings, view their information network or stored ...
Paid antivirus are waste of money for businesses, says study
Antivirus software are so ineffective in detecting new malware threats now that most companies are probably wasting your money buying this type of product. At least that is what concludes ...
