version

A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.

How North Korea’s “Red Star OS” Implements Censorship

Security researchers have revealed new details about the censorship features in North Korea’s homegrown operating system, Red Star OS, which monitors the files people store on their computer and traces them back to their source. Red Star OS is an operating developed by the North Korean government for use by the country’s citizens. It is …

How North Korea’s “Red Star OS” Implements Censorship Read More »

Tor Unveils Hardened Browser for Extra Security

The Tor project recently released the first version of its “hardened” Tor browser package. This release comes with extra security features designed to provide more privacy and protection against attacks. The Tor browser is a special Web browser package that makes it easy to connect to the Tor network. It is designed to be portable …

Tor Unveils Hardened Browser for Extra Security Read More »

Three Free Anti-Keylogging Apps For Windows

Keyloggers are one of the most effective ways for hackers to steal private information. Here are some solutions for preventing keyloggers from compromising your Windows system. Keyloggers come in two forms — those that are software-based and those that are embedded in hardware.  The latter can only be installed by someone who has physical access …

Three Free Anti-Keylogging Apps For Windows Read More »

Scroll to Top