Samsung Introduces Privacy Options App for Smart TV

Samsung has just revealed at CES 2020 that is taking place in Las Vegas in the United States, a new application for your smart TVs. Named Privacy Choices, the program was created to provide more transparency to its users, showing what types of data are collected using the manufacturer’s Smart TV devices. At the time of the … Read more

Encrypted Chat: Protect Your Privacy Communication!

Encrypted Chat: Protect Your Privacy Communication

Every day, about 3 billion people use instant messengers to communicate with their friends, family and work colleagues. We exchange not only text messages, but also voice messages, a nd sometimes we use the possibility of a video call. However, in connection with the latest news about world espionage and data leakage, people have begun … Read more

Ryuk virus no longer encrypts Windows 10 and Linux folders: Know why

Ryuk virus no longer encrypts Windows 10 and Linux folders

The ransomware Ryuk, which has placed the entire city of New Orleans in a state of emergency and brought down computers of oil refineries, hospitals, schools and government institutions, now cease to encrypt Linux folders used in Windows 10. But calm down, there is no kindness behind this decision of cybercriminals. Because if ransomware affected the Windows Subsystem for … Read more

Mac malware grew a lot in 2019

ALert: Mac malware grew a lot in 2019

The number of viruses made for macOS grew in 2019, according to data from Malwarebytes, which develops security solutions. Apple’s platform had a detectio n rate per user twice as high as Windows, but the vast majority of attacks were low impact. According to the data, Apple’s operating system had an index of 9.8 detected viruses per device in … Read more

Chinese hackers can bypass intrusive two-factor authentication

Safe user identification method has been circumvented by Chinese hackers

Two-factor Authentication (2FA) is one of the latest and most secure Internet user credential security systems, widely used by industry-wide names from PlayStation to Facebook and past Google. However, a new report can put this protection to the test. According to the Gizmochina website, a Chinese hacker group known as APT20 has been able to hack into systems protected by the 2FA verification method and, … Read more

Use Privacy Tools! Manage Your Internet Security!

Best Privacy Tools to Manage Your Internet Security

If you are an active user of the Internet, then for sure, everyday you use popular messengers for convenient communication with friends and relatives, browsers for quick search of the necessary information, plugins that simplify the work on the Internet and add special permissions that are not always present in the standard Internet assistants. However, … Read more

How to completely remove/uninstall Antivirus from your computer

How to completely remove/uninstall Antivirus from your computer

Antivirus is one of those software that promise to make your computer safe and optimized. Once installed, however, it becomes just the opposite: a problem from which it is very difficult to escape. If you are currently living with it, you know that uninstalling the app is not that simple. In this tutorial, we will … Read more

Why you should use ‘space’ in your passwords

Why you should use 'space' in your passwords

If your password is only one word, the best option to make it more secure may be to increase it – it’s time to upgrade to a “multi-word password” or “passphrase”. With more words at stake, why not use the spacebar? Why use the spacebar for passwords? Kiersten Todt, director of the Cyber ​​Readiness Institute and former Obama administration … Read more

How hackers use your Android camera to spy on you

Alert!! Hackers are using your Android camera to spy on you

Some researchers have shed light on a security flaw that could allow Android apps to spy on users You could be spied on by your Android camera. The alarm comes from several researchers, ready to highlight a security flaw that could allow some apps of the Mountain View operating system to observe users without their knowledge. It was the … Read more