Jump to content

Search the Community

Showing results for tags 'security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Categories

  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

  1. Meet Thistle, the startup that wants to secure billions of IoT devices Startup gets $2.5 million funding to jump-start security for connected devices. Enlarge Getty Images For more than two decades, Window Snyder has built security into products at some of the biggest companies in the world. Now, she’s unveiling her own company that aims to bake security into billions of connected devices made by other companies. San Francisco-based Thistle Technologies said on Thursday that it received
  2. New Dodge Challenger and Charger Software Limits Cars to 3 HP Because People Keep Stealing Them Dodge says the update will be good for “foiling fast getaways and joyrides.” It's no secret that car thieves have a thing for high-performance Dodge muscle cars. Because of that, the company is responding with a software patch that should make life a little harder for those who'd like to live the Hellcat life but refuse to do so under legal means. Soon to be available to Chargers and Challengers equipped with either the 6.2- or 6.4-liter Hemi V8 engines, a
  3. Email is an insecure, outdated communication method, but can it be saved? Despite growth in the use of instant messaging, email remains the most common form of business communication online. In 2019, there were over 3.9 billion email users globally, a number that’s set to rise to 4.48 billion by 2024. Any company operating online must use email services—there’s no avoiding it. But email was never designed to be a secure method of communication used daily by billions of people around the globe. While there have been many attempts to upgrade the security of email protocols, email is on
  4. Microsoft 365 adds 'External' email tags for increased security Microsoft is working on boosting Exchange Online phishing protection capabilities by adding support for external email message tags to its cloud-based email service. Once the feature is available, Exchange Online admins can increase their organizations' spam and phishing protection by having all emails from external senders tagged automatically. "This will be achieved by presenting a new tag on emails called 'External' in the message list," Microsoft explains in the Microsoft 365 roadmap.
  5. Microsoft: We're cracking down on malware that uses Excel macros A new antivirus and Office 365 integration from Microsoft allows for scanning malicious macro scripts written in XLM at runtime. Macro malware has been a popular choice for hackers since the 1990s and even in recent years the technique has continued to be a simple way of delivering malware to the unwary. Just last month, Ukraine accused Russian government spies of uploading documents with malicious macros to a Ukrainian government document-sharing site. And amid the first wave of the COVID-19 pandemi
  6. Microsoft says that Windows Server 2022 will come with security improvements and will bring Secured-core to the Windows Server platform. Windows Server 2022 is now in preview and "provides secured connectivity enabled by industry-standard AES 256 encryption," as Microsoft announced today. The next Windows Server release will also improve hybrid server management by enhancing performance monitoring and event alerts in Windows Admin Center. "Furthermore, this release includes significant improvements to Windows container runtime, such as virtualized time zones and IPV6 supp
  7. Apple's closed software ecosystem can be the perfect hiding spot for elite hackers Tight security can be a double-edged sword In brief: Apple is notorious for its walled garden approach and renowned for promoting security and privacy as the top feature of its products. However, security researchers believe this also means hackers who do manage to breach the wall tend to remain undetected a lot more often than you'd think. For years, Apple has touted the privacy and the security of its devices and explained through its marketing that it values those two
  8. Google funds Linux maintainers to boost Linux kernel security Together with the Linux Foundation, Google announced today that they would fund two Linux kernel developers' efforts as full-time maintainers exclusively focused on improving Linux security. "While there are thousands of Linux kernel developers, all of whom take security into consideration as the due course of their work, this contribution from Google to underwrite two full-time Linux security maintainers signals the importance of security in the ongoing sustainability of open-source softw
  9. Android 12 is bringing some important security features Protecting your privacy will be one of the main reasons to upgrade (Image credit: Google) Google is doubling down on security and privacy enhancements in Android 12 and when the next version of its mobile operating system launches this fall, users will be able to manually block access to some of the hardware sensors on their devices. As reported by 9To5Google, the latest version of Android includes a pair of new toggles that will all
  10. Apple Offers Its Closest Look Yet at iOS and MacOS Security In its latest Platform Security Guide, Cupertino raised the curtain on the critical features that protect against hackers. Security researchers still want more info from Apple—but this is a good start.Photograph: Aaron P./Bauer-Griffin/Getty Images Apple is a notoriously tight-lipped and insular organization, a tendency that has often put it at odds with the security research community. The company
  11. Google Meet is getting an important new security feature It will enable Meet users to better optimize network access (Image credit: Google) Video communication tool Google Meet has announced a change to how it manages network traffic, making it easier for administrators to configure their firewalls to allow authorized traffic but block untrusted networks. In addition, the update now ensures that non-Google Workspace users receive the same protections as Workspace users. Back in January 20
  12. Windows 10 features that boost your PC's security and privacy Like almost all operating systems, Windows 10 is vulnerable to security and privacy issues, and researchers have proved that Microsoft can track a lot of your activities to improve their products and enable personalized ads and promotions. Thankfully, Windows 10 allows us to improve the operating system's security and privacy using the built-in settings app. If you've concerns about your data security and privacy, you should consider making the below changes. Security features you
  13. Google researcher discovers new iOS security system iOS 14 shipped with BlastDoor, a new sandbox system for processing iMessages data. Image via Thom With the release of iOS 14 last fall, Apple has added a new security system to iPhones and iPads to protect users against attacks carried out via the iMessage instant messaging client. Named BlastDoor, this new iOS security feature was discovered by Samuel Groß, a security researcher with Project Zero, a Google security team tasked with finding vulnerabilities in commonly-used software. G
  14. malakai1911

    Comprehensive Security Guide

    Comprehensive Security Guide NOTE: As of 1/1/2019 this guide is out of date. Until parts are rewritten, consider the below for historical reference only. i. Foreword The primary purpose of this guide is to offer a concise list of best-of-breed software and advice on selected areas of computer security. The secondary purpose of this guide is to offer limited advice on other areas of security. The target audience is an intermediately skilled user of home computers. Computer software listed are the freeware versions when possible or have free versions av
  15. Three years after the first malware attacks targeting Docker, developers are still misconfiguring and exposing their Docker servers online. Towards the end of 2017, there was a major shift in the malware scene. As cloud-based technologies became more popular, cybercrime gangs also began targeting Docker and Kubernetes systems. Most of these attacks followed a very simple pattern where threat actors scanned for misconfigured systems that had admin interfaces exposed online in order to take over servers and deploy cryptocurrency-mining malware. Ov
  16. The company won't have to pay a fine for the time being. Since it exploded in popularity at the start of the coronavirus pandemic, Zoom has promised to address the more glaring security and privacy issues that are a part of its video meeting software. And now the company has a regulatory incentive to do exactly that. As part of a new proposed settlement with the Federal Trade Commission (FTC) over its privacy practices, the company must establish an information security program that will see it share security audits with the agency. Zoom has al
  17. NEW YORK (Reuters) - Twitter Inc suffered from cybersecurity shortfalls that enabled a “simple” hack attributed to a Florida teenager to take over the accounts of several of the world’s most famous people in July, according to a report released on Wednesday. The report by New York’s Department of Financial Services also recommended that the largest social media companies be deemed systemically important, like some banks following the 2008 financial crisis, with a dedicated regulator monitoring their ability to combat cyberattacks and election interference.
  18. LibreAV v1.0.2 (10002) (Open Source Real Time Scanning Antivirus) LibreAV is an attempt to detect malware on Android devices using a machine learning approach that is powered by TensorFlow. We use a two-layer neural network trained with a carefully selected set of features. The neural network is tuned in such a way that it performs efficiently on mobile devices where computational resources are limited. Tests show that LibreAV performs efficiently and effectively even on low-end mobile devices. With LibreAV, you can scan all the installed apps in your devi
  19. U-VPN (Free Unlimited & Very Fast & Secure VPN) v3.6.0 (Ad-Free) (derrin Mod) U-VPN is super fast VPN service using a new technology. U-VPN is the ultimate Android VPN. It is 100% free unlimited VPN. Easy to use, One click to connecting to U-VPN server. U-VPN is completely anonymous. All of your traffic is encrypted and not logged at all. U-VPN give you unlimited bandwidth and unlimited free trial time. U-VPN protect your privacy and keep you safe from 3rd party tracking. Unblock geographically restricted websites through U-VPN serve
  20. The year 2018 saw several tech companies working hard and delivering some of the best biometric authentication tech on devices. Until now we have seen iris scanner, face scanners and optical fingerprint scanners securing content on devices. However, there’s a new biometric tech that is hardly used anywhere – vein authentication. And this too has been hacked. For those unaware, ‘vein authentication’ tech recognises the placement of user's vein under the skin. It also scans the shape and size of the vein under the user’s skin. But then hackers have found a way to bypass this tech as well by s
  21. The secrecy surrounding the work was unheard of at Google. It was not unusual for planned new products to be closely guarded ahead of launch. But this time was different. The objective, code-named Dragonfly, was to build a search engine for China that would censor broad categories of information about human rights, democracy, and peaceful protest. In February 2017, during one of the first group meetings about Dragonfly at Google’s Mountain View headquarters in California, some of those present were left stunned by what they heard. Senior executives disclosed that the se
  22. System Mechanic Pro 18.5.1.208 System Mechanic is a program whose undoubted advantage is its versatility. Contains more than 50 applications designed to diagnose, fix errors and optimize the performance of your computer. Among the features worth highlighting disk defragmentation, correction of system registry errors, recovery of deleted data, cleaning of useless files, an increase in the operating system speed and speed of the Internet connection. Using these and a number of other highly specialized utilities, the work of your computer will always be at its best. D
  23. HandyPAF

    Noralabs Norascan 3.3

    Scans and detects malware, spyware, and other threats. Noralabs Norascan is an antivirus application built specifically for helping you scan the computer for potential threats. Sometimes, even if you use a good antivirus application, malware, spyware, and other threats may infiltrate into your computer without even being able to detect their presence. The tool provides two different scanning modes, namely quick or full. Of course, the first one is the fastest one because it scans only some locations from your computer. The full mode is the most comprehensive
  24. Last week we learned about DataSpii, a report by independent researcher Sam Jadali about the “catastrophic data leak” wrought by a collection of browser extensions that surreptitiously extracted their users’ browsing history (and in some cases portions of visited web pages). Over four million users may have had sensitive information leaked to data brokers, including tax returns, travel itineraries, medical records, and corporate secrets. While DataSpii included extensions in both the Chrome and Firefox extension marketplaces, the majority of t
  25. LAS VEGAS (Reuters) - Apple Inc (AAPL.O) is offering cyber security researchers up to $1 million to detect flaws in iPhones, the largest reward offered by a company to defend against hackers, at a time of rising concern about governments breaking into the mobile devices of dissidents, journalists and human rights advocates. Unlike other technology providers, Apple previously offered rewards only to invited researchers who tried to find flaws in its phones and cloud backups. At the annual Black Hat security conference in Las Vegas on Thursday, the company said it would o
×
×
  • Create New...