TOR is one of the anonymous systems navigation more popular in the world. Proof of this is that famous people use it to maintain their anonymity and avoid detection. However, although it is constantly updated, every few days there are new bugs that help to expose to users. Therefore, it is still developing security measures that allow avoiding errors.
The latest development in this regard has come to us from one of the last meetings that took the team of the project, where they tested a new system of generating random numbers that can increase security. The new mechanism causes two computers generate, respectively, a random number, which come together in a unique destination. Initially, the system would be impossible to crack because it is necessary to know the initial network and computers from which data have been issued. Continue reading “TOR will have a new algorithm to increase security”
We cannot deny that the attacks by ransomware have become extremely popular. Threats, in fact, are evolving in different ways, even to become extremely dangerous elements. For example, if a virus is detected, new options develop so that it attacks more efficiently, putting users in situations where their data are in extreme danger.
One of the most recent examples is the Cerber ransomware. Initially, the virus was responsible only encrypt files on the infected computer and lock the screen. A fairly simple operation that already was turning a solution. However, it has detected a new version that is responsible for performing DDoS attacks. Continue reading “Cerber, the ransomware which now makes DDoS attacks”
Tagged : Cerber ransomware
Taking into account that the ransomware type viruses are taking unprecedented popularity, security companies are putting the batteries in order to prevent the harmful effects of these attacks go further. We could say that we have an explosion of developments, with two sides, good and bad, that have much to say. In this scenario, of course, are coming to light all kinds of tools to implement solutions to the problems that occur.
One of the latest tools against ransomware type virus is Ransomware Removal Kit, a very complete package (weighs 270 MB) which includes a lot of options that will allow us to eliminate these viruses from our computer. In fact, all solutions are included in appropriate folders, with several HTML files in which specify the steps to follow. You just have to select the solution that you want to apply. Continue reading “Ransomware Removal Kit, a pack to end with the ransomware”
Tagged : Ransomware Removal Kit
Within web browsing, the certificates are one of the most reliable tools we have at our disposal, adding an additional security layer which serves to prevent communications to be read by third parties. They are automatically installed and we just have to interact with them. Although the recent cyber-attacks have succeeded that we begin to distrust them.
Lately it has become fashionable to install infected certificates that in addition to not provide the promised security, allow other people to read encrypted content apparently. Against this background, it is necessary to obtain tools to analyze the certificates. RCC is one of them. This is a utility that analyzes them and verifies that they are benign. Continue reading “RCC, a utility for detecting infected certificates”
Tagged : RCC
If you do not know RC4, right away so we put in the field. In those three characters hides one of the encryption systems more used today. The contents of the connections via SSL, TLS or WEP encrypted thanks to the protocol, so it is clear that its consequences are for safety networks. What the vast majority of users do not know is that many programmers are giving their backs because insecure that is, with multiple failures are threatening communications.
Mozilla, Google and Microsoft, three of the most popular on the planet entities still use RC4 in their programs. Although its will be for a short time, as announced its intention to stop giving support in 2016. The reasons already know: the protocol is so insecure that no longer trust it. Continue reading “Mozilla, Google and Microsoft will no longer support RC4 in 2016”
If you have been attentive to the recent cracking of the Hacking Team company, then you also know that reference is to the material that has leaked multiple vulnerabilities in Adobe Flash Player. The known plugin, widely used on the network to display multimedia content takes time on everyone’s lips. In fact, some companies are failing to give support due to the inconvenience involved.
Of course, from Adobe they are working on making both performance and security software are maximal. Knowing the last holes that have been discovered, the team has to work in order to launch a new version of the gourd. The numbering 220.127.116.11 is already among us. And we know its goal: Protect users from attacks that are being made. Continue reading “Flash Player 18.104.22.168 comes to solve security issues”
Download content using P2P networks is increasingly dangerous. A few years ago we could do it with total disregard. However, the law has progressed and some countries do this is punishable by fines of different amounts. It is clear that many users avoid carrying out the activity.
Of course, there are many groups who are working to bring the contents to peer networks. The bad thing is that behind some of these contents lie the popular anti-piracy companies, dedicated to check the IPs that are downloading files, and then proceeding to fine users. Continue reading “TorrentTags warns you of the torrents that can be dangerous”
Tagged : TorrentTags
The new CCleaner 4 of the Piriform company is now available for download. It certainly is one of the best programs to keep our computer clean and organized.
This new version incorporates some interesting enhancements that improve performance and help us achieve higher quality results.
The highlights of the new CCleaner 4 are two new features that developers have added to the software. The first one is a duplicate file finder, it will take care of scanning our PC for identical content that occupy disk space unnecessarily. This new module has filters to define which files are included in the search and which are excluded. Continue reading “New CCleaner 4 with great improvements”
Tagged : highlights of the new CCleaner 4 / new CCleaner 4 / new features of the new CCleaner 4
Do you know how many applications you have given permission to access your online information services with Twitter, Facebook or Linkedin? For if not know the answer you can find it with MyPermissions, an application that has been running successfully for a while, but remember that every day there are new users in a number of online services and is never more advocate for the security of our personal information.
Our website is growing every day and it is common for many applications or services request access to any information of our account. Many times we give for different reasons that can range from taking a course to have fun with a game but periodically should review these permits and revoke access for those applications that have already stopped using. Continue reading “Check out which applications have access to your online information with MyPermissions”
Tagged : MyPermission helps us / MyPermissions
ICE Unlock Fingerprint Secure is an Android app that will give the chance to unlock the mobile using the fingerprint. The program makes use of the rear camera, both to store a high resolution picture of the fingerprint, as to carry out the unfreezing.
When Apple Touch ID was added as a feature to iPhone 5s last year, many wondered about something similar for Android phones. The answer is not slow in coming, as there are many applications that try to do the same on Android, although in our opinion the best (complete with limitations) is ICE Unlock Fingerprint Secure. We’ll show you how this application works; you can unlock the phone with your fingerprint. Continue reading “ICE Unlock Fingerprint Secure: Use your fingerprint to unlock the phone”
Tagged : ICE Unlock Fingerprint Secure