Jump to content

Search the Community

Showing results for tags 'security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Categories

  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

  1. Apple's closed software ecosystem can be the perfect hiding spot for elite hackers Tight security can be a double-edged sword In brief: Apple is notorious for its walled garden approach and renowned for promoting security and privacy as the top feature of its products. However, security researchers believe this also means hackers who do manage to breach the wall tend to remain undetected a lot more often than you'd think. For years, Apple has touted the privacy and the security of its devices and explained through its marketing that it values those two
  2. Google funds Linux maintainers to boost Linux kernel security Together with the Linux Foundation, Google announced today that they would fund two Linux kernel developers' efforts as full-time maintainers exclusively focused on improving Linux security. "While there are thousands of Linux kernel developers, all of whom take security into consideration as the due course of their work, this contribution from Google to underwrite two full-time Linux security maintainers signals the importance of security in the ongoing sustainability of open-source softw
  3. Android 12 is bringing some important security features Protecting your privacy will be one of the main reasons to upgrade (Image credit: Google) Google is doubling down on security and privacy enhancements in Android 12 and when the next version of its mobile operating system launches this fall, users will be able to manually block access to some of the hardware sensors on their devices. As reported by 9To5Google, the latest version of Android includes a pair of new toggles that will all
  4. Apple Offers Its Closest Look Yet at iOS and MacOS Security In its latest Platform Security Guide, Cupertino raised the curtain on the critical features that protect against hackers. Security researchers still want more info from Apple—but this is a good start.Photograph: Aaron P./Bauer-Griffin/Getty Images Apple is a notoriously tight-lipped and insular organization, a tendency that has often put it at odds with the security research community. The company
  5. Google Meet is getting an important new security feature It will enable Meet users to better optimize network access (Image credit: Google) Video communication tool Google Meet has announced a change to how it manages network traffic, making it easier for administrators to configure their firewalls to allow authorized traffic but block untrusted networks. In addition, the update now ensures that non-Google Workspace users receive the same protections as Workspace users. Back in January 20
  6. Windows 10 features that boost your PC's security and privacy Like almost all operating systems, Windows 10 is vulnerable to security and privacy issues, and researchers have proved that Microsoft can track a lot of your activities to improve their products and enable personalized ads and promotions. Thankfully, Windows 10 allows us to improve the operating system's security and privacy using the built-in settings app. If you've concerns about your data security and privacy, you should consider making the below changes. Security features you
  7. Google researcher discovers new iOS security system iOS 14 shipped with BlastDoor, a new sandbox system for processing iMessages data. Image via Thom With the release of iOS 14 last fall, Apple has added a new security system to iPhones and iPads to protect users against attacks carried out via the iMessage instant messaging client. Named BlastDoor, this new iOS security feature was discovered by Samuel Groß, a security researcher with Project Zero, a Google security team tasked with finding vulnerabilities in commonly-used software. G
  8. malakai1911

    Comprehensive Security Guide

    Comprehensive Security Guide NOTE: As of 1/1/2019 this guide is out of date. Until parts are rewritten, consider the below for historical reference only. i. Foreword The primary purpose of this guide is to offer a concise list of best-of-breed software and advice on selected areas of computer security. The secondary purpose of this guide is to offer limited advice on other areas of security. The target audience is an intermediately skilled user of home computers. Computer software listed are the freeware versions when possible or have free versions av
  9. Three years after the first malware attacks targeting Docker, developers are still misconfiguring and exposing their Docker servers online. Towards the end of 2017, there was a major shift in the malware scene. As cloud-based technologies became more popular, cybercrime gangs also began targeting Docker and Kubernetes systems. Most of these attacks followed a very simple pattern where threat actors scanned for misconfigured systems that had admin interfaces exposed online in order to take over servers and deploy cryptocurrency-mining malware. Ov
  10. The company won't have to pay a fine for the time being. Since it exploded in popularity at the start of the coronavirus pandemic, Zoom has promised to address the more glaring security and privacy issues that are a part of its video meeting software. And now the company has a regulatory incentive to do exactly that. As part of a new proposed settlement with the Federal Trade Commission (FTC) over its privacy practices, the company must establish an information security program that will see it share security audits with the agency. Zoom has al
  11. NEW YORK (Reuters) - Twitter Inc suffered from cybersecurity shortfalls that enabled a “simple” hack attributed to a Florida teenager to take over the accounts of several of the world’s most famous people in July, according to a report released on Wednesday. The report by New York’s Department of Financial Services also recommended that the largest social media companies be deemed systemically important, like some banks following the 2008 financial crisis, with a dedicated regulator monitoring their ability to combat cyberattacks and election interference.
  12. LibreAV v1.0.2 (10002) (Open Source Real Time Scanning Antivirus) LibreAV is an attempt to detect malware on Android devices using a machine learning approach that is powered by TensorFlow. We use a two-layer neural network trained with a carefully selected set of features. The neural network is tuned in such a way that it performs efficiently on mobile devices where computational resources are limited. Tests show that LibreAV performs efficiently and effectively even on low-end mobile devices. With LibreAV, you can scan all the installed apps in your devi
  13. U-VPN (Free Unlimited & Very Fast & Secure VPN) v3.6.0 (Ad-Free) (derrin Mod) U-VPN is super fast VPN service using a new technology. U-VPN is the ultimate Android VPN. It is 100% free unlimited VPN. Easy to use, One click to connecting to U-VPN server. U-VPN is completely anonymous. All of your traffic is encrypted and not logged at all. U-VPN give you unlimited bandwidth and unlimited free trial time. U-VPN protect your privacy and keep you safe from 3rd party tracking. Unblock geographically restricted websites through U-VPN serve
  14. AdGuard for Android version 4.0 nightly 1 AdGuard is a unique no root ad blocker for Android that removes ads in apps and browsers, protects your privacy, and helps you manage your apps. Blocks ads everywhere Block throughout the whole system. This includes video ads and ads in your favorite apps, browsers, games, and on any website you can imagine. Dozens of ad filters are available to you and are updated on a regular basis, guaranteeing the best filtering quality. Cares about your privacy We value the privacy of your personal data ab
  15. Mine is extremely light, but undoubtedly powerful. Here is my setup: Defensewall ShadowDefender Keyscrambler Sandboxie (custom rules) (A2, SAS, MBAM used rarely, on demand)
  16. The year 2018 saw several tech companies working hard and delivering some of the best biometric authentication tech on devices. Until now we have seen iris scanner, face scanners and optical fingerprint scanners securing content on devices. However, there’s a new biometric tech that is hardly used anywhere – vein authentication. And this too has been hacked. For those unaware, ‘vein authentication’ tech recognises the placement of user's vein under the skin. It also scans the shape and size of the vein under the user’s skin. But then hackers have found a way to bypass this tech as well by s
  17. System Mechanic Pro 18.5.1.208 System Mechanic is a program whose undoubted advantage is its versatility. Contains more than 50 applications designed to diagnose, fix errors and optimize the performance of your computer. Among the features worth highlighting disk defragmentation, correction of system registry errors, recovery of deleted data, cleaning of useless files, an increase in the operating system speed and speed of the Internet connection. Using these and a number of other highly specialized utilities, the work of your computer will always be at its best. D
  18. This tool is intended to check all files from system Autostart on VirusTotal. It is simply a launcher for Mark Russinovich's Autorunsc. AutorunsVTchecker was made for remote help with infected system. You don't have to ask user to check each different file separately and don't have to explain how to do it. You just have to give user a link to download and run it. When it ends checking, it'll show appropriate message. Helper should see needed report on virustotal by file hash. No logs. If you still need an Autoruns log, it is better to get it through the Autoruns GUI. First st
  19. With the launch of a new national cyber strategy, President Donald Trump has authorized the use of “offensive cyber operations” against U.S. adversaries, National Security Adviser John Bolton told reporters on Thursday. The U.S. hopes by deploying offensive measures it can deter cyberattacks targeting critical infrastructure and other systems, Bolton said, by demonstrating to adversaries that the cost “is higher than they want to bear.” In a letter, Trump said the new guidelines demonstrated his commitment to securing America from digital threats. “It is a c
  20. HandyPAF

    Noralabs Norascan 3.3

    Scans and detects malware, spyware, and other threats. Noralabs Norascan is an antivirus application built specifically for helping you scan the computer for potential threats. Sometimes, even if you use a good antivirus application, malware, spyware, and other threats may infiltrate into your computer without even being able to detect their presence. The tool provides two different scanning modes, namely quick or full. Of course, the first one is the fastest one because it scans only some locations from your computer. The full mode is the most comprehensive
  21. The secrecy surrounding the work was unheard of at Google. It was not unusual for planned new products to be closely guarded ahead of launch. But this time was different. The objective, code-named Dragonfly, was to build a search engine for China that would censor broad categories of information about human rights, democracy, and peaceful protest. In February 2017, during one of the first group meetings about Dragonfly at Google’s Mountain View headquarters in California, some of those present were left stunned by what they heard. Senior executives disclosed that the se
  22. Yahoo Mail and AOL Mail, which both fly under the Oath banner, a Verizon owned company, scan emails that arrive in user inboxes to improve advertisement targeting. An article published by The Wall Street Journal (sorry, no link as it is paywalled), suggests that Oath's email scanning may go beyond what users of the service may deem acceptable. According to the article, Yahoo is scanning commercial emails of all free users who did not opt-out of personalized advertisement to improve targeted advertising. Yahoo creates profiles of users by assigning them to ce
  23. More than half of professionals think they have a good shot at a successful insider attack. Computer professionals may think their enterprise security is good, but they think their skills are better. In fact, almost half think they could pull off a successful insider attack, according to a new report by Imperva. Indeed, 43% of the 179 IT professionals surveyed said they could successfully attack their own organizations, while another 22% said they would have at least a 50/50 chance at success. When it came to the attack surface, only 23% said the
  24. Bausch

    Nulled Boards.

    Hello everyone, I was wondering about the risks if one opts for using nulled php software on a forum, is it really safe, or there are known cases of backdoors and other risks involved? I am not sure about what is being said that the teams who do the nulling may insert code of their own that would compromise the security of the forum, such could be scare tactics to discourage many from using a nulled board. Also, are there trusted sources for such releases, or if one group is better than another in any way? Thank you.
×
×
  • Create New...