tor new algorithm

TOR will have a new algorithm to increase security

TOR is one of the anonymous systems navigation more popular in the world. Proof of this is that famous people use it to maintain their anonymity and avoid detection. However, although it is constantly updated, every few days there are new bugs that help to expose to users. Therefore, it is still developing security measures…

cerber ransomware

Cerber, the ransomware which now makes DDoS attacks

We cannot deny that the attacks by ransomware have become extremely popular. Threats, in fact, are evolving in different ways, even to become extremely dangerous elements. For example, if a virus is detected, new options develop so that it attacks more efficiently, putting users in situations where their data are in extreme danger. One of…

Ransomware Removal Kit

Ransomware Removal Kit, a pack to end with the ransomware

Taking into account that the ransomware type viruses are taking unprecedented popularity, security companies are putting the batteries in order to prevent the harmful effects of these attacks go further. We could say that we have an explosion of developments, with two sides, good and bad, that have much to say. In this scenario, of…

rcc utility

RCC, a utility for detecting infected certificates

Within web browsing, the certificates are one of the most reliable tools we have at our disposal, adding an additional security layer which serves to prevent communications to be read by third parties. They are automatically installed and we just have to interact with them. Although the recent cyber-attacks have succeeded that we begin to…

no longer support RC4

Mozilla, Google and Microsoft will no longer support RC4 in 2016

If you do not know RC4, right away so we put in the field. In those three characters hides one of the encryption systems more used today. The contents of the connections via SSL, TLS or WEP encrypted thanks to the protocol, so it is clear that its consequences are for safety networks. What the…

adove flash player

Flash Player 18.0.0.209 comes to solve security issues

If you have been attentive to the recent cracking of the Hacking Team company, then you also know that reference is to the material that has leaked multiple vulnerabilities in Adobe Flash Player. The known plugin, widely used on the network to display multimedia content takes time on everyone’s lips. In fact, some companies are…

torrenttags

TorrentTags warns you of the torrents that can be dangerous

Download content using P2P networks is increasingly dangerous. A few years ago we could do it with total disregard. However, the law has progressed and some countries do this is punishable by fines of different amounts. It is clear that many users avoid carrying out the activity. Of course, there are many groups who are…

new CCleaner 4

New CCleaner 4 with great improvements

The new CCleaner 4 of the Piriform company is now available for download. It certainly is one of the best programs to keep our computer clean and organized. This new version incorporates some interesting enhancements that improve performance and help us achieve higher quality results. The highlights of the new CCleaner 4 are two new…

ICE Unlock Fingerprint Secure

ICE Unlock Fingerprint Secure: Use your fingerprint to unlock the phone

ICE Unlock Fingerprint Secure is an Android app that will give the chance to unlock the mobile using the fingerprint. The program makes use of the rear camera, both to store a high resolution picture of the fingerprint, as to carry out the unfreezing. When Apple Touch ID was added as a feature to iPhone…