The two-step authentication has become one of the most comprehensive in the world and popular security tools. Not surprisingly, it has been proves that the only use of the password is no longer a final measure, so that companies and pages are being put hands to the work in order to add new layers of security to protect the personal data of the users.
Many of the most popular services have already integrated this new measure, although there is no doubt that there are many additional steps are still pending. For example, some applications have not yet implemented the option, leaving users to partially insecure. And, as rumored, the WhatsApp application may include two-step authentication. Continue reading “WhatsApp will have two-step authentication”
The field of security is such a hot state that no user is completely safe. In fact, the ransomware type viruses have become extremely dangerous and when we surf the Internet, we need to take very special care. However, the encryption of files can also become a very good job and totally secure. Especially in those moments when we want our files are safe.
If you want to encrypt your data in an efficient and successful manner, it may be time for you to take a look at Fort File Encryption, a utility that allows you to encrypt the data that you want in your computer. Even you can ensure your entire hard drive of your PC, if it is necessary. Continue reading “Fort File Encryption, a new application to encrypt files”
TOR is one of the anonymous systems navigation more popular in the world. Proof of this is that famous people use it to maintain their anonymity and avoid detection. However, although it is constantly updated, every few days there are new bugs that help to expose to users. Therefore, it is still developing security measures that allow avoiding errors.
The latest development in this regard has come to us from one of the last meetings that took the team of the project, where they tested a new system of generating random numbers that can increase security. The new mechanism causes two computers generate, respectively, a random number, which come together in a unique destination. Initially, the system would be impossible to crack because it is necessary to know the initial network and computers from which data have been issued. Continue reading “TOR will have a new algorithm to increase security”
We cannot deny that the attacks by ransomware have become extremely popular. Threats, in fact, are evolving in different ways, even to become extremely dangerous elements. For example, if a virus is detected, new options develop so that it attacks more efficiently, putting users in situations where their data are in extreme danger.
One of the most recent examples is the Cerber ransomware. Initially, the virus was responsible only encrypt files on the infected computer and lock the screen. A fairly simple operation that already was turning a solution. However, it has detected a new version that is responsible for performing DDoS attacks. Continue reading “Cerber, the ransomware which now makes DDoS attacks”
As you have already guessed by the latest entries posted, the world of the virus are moving extremely fast, with news arriving every few hours and threats that do nothing but come and go and then come back stronger than ever. Special mention to the ransomware, which more problems are occurring. However, this news concerns Qbot, a virus that made an appearance in 2009. It has been quite enough time since then.
Symantec detected the original variant, proceeding to eliminate as far as possible. The objective of the threat was the steal data and information from infected computers. It seems that the virus was removed. Although it has come back. And now it is more powerful and dangerous than ever. Be careful with it, because it could give you a surprise. Continue reading “Qbot return, and is now more dangerous than ever”
Taking into account that the ransomware type viruses are taking unprecedented popularity, security companies are putting the batteries in order to prevent the harmful effects of these attacks go further. We could say that we have an explosion of developments, with two sides, good and bad, that have much to say. In this scenario, of course, are coming to light all kinds of tools to implement solutions to the problems that occur.
One of the latest tools against ransomware type virus is Ransomware Removal Kit, a very complete package (weighs 270 MB) which includes a lot of options that will allow us to eliminate these viruses from our computer. In fact, all solutions are included in appropriate folders, with several HTML files in which specify the steps to follow. You just have to select the solution that you want to apply. Continue reading “Ransomware Removal Kit, a pack to end with the ransomware”
ownCloud, the free system that allows you to mount your own server in the cloud, continues to prepare new versions. A few weeks ago we received the numbering 9.0. Of course, there is not the thing. The development team is already preparing the edition 9.1.
A minor release that, if not properly include massive developments, it will have some interesting features. As we have known through the official blog, there are emerging as some of the features that will be available. Continue reading “ownCloud 9.1: The new version begins to take shape”
Within web browsing, the certificates are one of the most reliable tools we have at our disposal, adding an additional security layer which serves to prevent communications to be read by third parties. They are automatically installed and we just have to interact with them. Although the recent cyber-attacks have succeeded that we begin to distrust them.
Lately it has become fashionable to install infected certificates that in addition to not provide the promised security, allow other people to read encrypted content apparently. Against this background, it is necessary to obtain tools to analyze the certificates. RCC is one of them. This is a utility that analyzes them and verifies that they are benign. Continue reading “RCC, a utility for detecting infected certificates”
Skype Translator is one of the most interesting features of the instant messaging application Skype, allowing real-time translation between different languages. However, there are still limitations which must be fixed. For example, the Arabic language was not supported. We speak in past since, thanks to a recent system update, we have available this function.
Thanks to the Modern Standard Arabic package recently have at our disposal the possibility that the project itself can translate and transcribe the Arabic, providing a very interesting novelty. Especially for people who speak it. Thanks to the update (you can already enjoy), Skype Translator speaks in a total of eight languages, including English, French, German, Italian, Mandarin Chinese, Brazilian, Portuguese and Spanish. Continue reading “Skype Translator now supports the Arabic language”
One of the major problems of the Windows operating system is the computer virus. Each time a new installation is done, it is essential to integrate an antivirus that avoids most problems that can arrive. Windows Defender is one of the solutions that were already included in the package. Although Microsoft has put the batteries with a new feature: Windows Defender Offline.
The function was removed a few years ago, but has now become more interesting way. Thanks to the latest Insider Builds, we have seen how the original Windows Defender can scan our computer even before start the operating system. In fact, an Internet connection is not necessary. Interesting: right? As well we will be more secure. Continue reading “Windows Defender Offline, Windows 10 integrates new security options”