You are here: News > 
25.10.2014 : 13:10

News

14 January 2011
iPhone Safer from Hackers than Android

Android-based smartphones are more vulnerable to attacks by hackers and electronic viruses than the iPhone, according to the chairman of the world’s largest provider of security software for corporate servers. The remarks...[more]


14 January 2011
Tips for Correct Passwords

Choosing Passwords These days, we have passwords for just about everything. You need a PIN to use your debit card or access an ATM. You need a password to log on to your bank, Amazon and other shopping sites, your favorite...[more]


14 January 2011
Security Risks When Using VoIP

Identity and service theft VoIP services can be phreaked. Phreaking is a type of hacking that steals or uses a service from a service provider on the expenditure of another person. Session initiation protocol (SIP) – an...[more]


14 January 2011
Mac App Store Protection Cracked

A group of hackers, Hackulous, announced that they developed a program called “Kickback” that can break the protection of applications hosted on the Mac App Store. In order words this means that by installing this software users...[more]


14 January 2011
US orders Twitter to hand over account data on Wikileaks and multiple Wikileaks

US orders Twitter to hand over information about accounts registered or associated with Wikileaks, rop_g, ioerror, birgittaj, Julian Assange, Bradley Manning, Rop Gongrijp, and Birgitta Jonsdottir for the time period November...[more]


14 January 2011
Which is the fastest computer ?

Since 1993, the fastest supercomputers have been ranked on the TOP500 list according to their LINPACK  benchmark results. But how unbiased and definitive is this list? At the moment the top supercomputer in list is China’s...[more]


14 January 2011
“Anonymous” activities

Anonymous is a group of individuals, mainly from on-line community, who share common ideas and act against self agreed goals under the name “Anonymous”. Their strength lies in their number and the true anonymity....[more]


7 January 2011
New Trojan affects Android devices

A new sophisticated Android Trojan, dubbed “Geinimi”, emerged in China compromising devices, bundling with botnet-style functionality. The malware sends personal data of a user’s phone to a remote server and is...[more]


7 January 2011
$120 to decrypt your files (ransomware attack)

According to researchers at SophosLabs hackers are trying to spread a new ransomware in order to extort $120. More specifically this ransomware encrypts media and Office files on victim’s computer. As a result victims cannot...[more]


7 January 2011
Top 10 security threats for 2011

Imperva announced their Top 10 Security Threats for 2011, which include: 1. Nation-sponsored hacking: Advanced technological threats (hacker industry and APT) from hackers who are funded by a government, like Stuxnet. 2. Insider...[more]