Search Results

According to the administration of Facebook, the social network has undergone a “complex” attack by unknown hackers. At the same time, according to a company blog that the incident was identified in January of this year. Any sensitive data of users, according to Facebook, were not compromised. Social networking experts also noted that the risk […]

Dr.Web Anti-virus for Windows ensures reliable protection from viruses, rootkits, spyware, adware, hacking tools, programs, dialers and joke programs. Dr.Web Anti-virus for Windows filters email traffic, detects and removes malicious code that monitors the file system. Dr.Web for Windows regularly updates the list of viruses. Dr.Web Anti-virus for Windows provides: – Detection and neutralization of malware on […]

 eScan – how to protect a PC against hacker attacks via unpatched vulnerabilities Oracle Java Recall, August 27, 2012 the company FireEye researchers reported in his blog about the dangerous gaps in the Java Runtime Environment (JRE) 1.7 – runtime Java. Vulnerabilities, the current platforms Microsoft Windows, Mac OS X and Linux, was given the […]

According to experts, cyber criminals target, at least 30 major U.S. banks. Antivirus company McAfee researchers found that cybercriminals are preparing a number of large-scale attacks against the United States, which would be implemented in the spring of next year. As it became known to the experts, the project named ‘Blitzkrieg’ should destabilize the system […]

Janet Napolitano of the Representative office, said that a number of major U.S. financial institutions are actively tried discredit. According to a leader of the Department of Homeland Security (DHS) U.S. Secretary Janet Napolitano, over the past few days by unknown hackers are actively trying to discredit a number of major financial institutions in the […]

The network software is the most vulnerable, because the communication channel through which messages are transmitted, most often not protected, and anyone who may have access to the channel, respectively, can intercept messages and send your own. Therefore, at the level of the ACT, the following hacks: – listening to the local network segment (within […]

Protect the operating system, as opposed to DBMS, it is much more difficult. The fact that the internal structure of modern operating systems are extremely complex, and therefore compliance with the adequate security policy is a much more difficult task. Among the people are of the opinion that the most effective attacks on operating Systems […]

Detecting intrusions of your network can sometimes be difficult. You can’t assume it’s a big, catastrophic event. In fact, hackers would prefer that you never notice at all. Here are five signs to be on the lookout for. Your Firewalls or Anti-virus Software Are Disabled If you find that they’re been turned off, it may […]

Golden ticket attacks first became popular in 2014 when the vulnerability was discovered and publicized within the Kerberos system. And though those with the Kerberos system were known to be vulnerable, the type of exploit could be seen on other platforms as well. It’s important to take measures to protect your business from these types […]

Never before has a movie achieved more international attention, and it never even hit the screen. White House spokesman Josh Earnest called the cyber attack at Sony, or the “Sony hack,” as it been named,  a destructive attack exposing serious security measures. To Hollywood and the rest of the country, it was a total surprise […]