Jump to content

Search the Community

Showing results for tags 'security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

  1. NEW YORK (Reuters) - Twitter Inc suffered from cybersecurity shortfalls that enabled a “simple” hack attributed to a Florida teenager to take over the accounts of several of the world’s most famous people in July, according to a report released on Wednesday. The report by New York’s Department of Financial Services also recommended that the largest social media companies be deemed systemically important, like some banks following the 2008 financial crisis, with a dedicated regulator monitoring their ability to combat cyberattacks and election interference.
  2. LibreAV v1.0.2 (10002) (Open Source Real Time Scanning Antivirus) LibreAV is an attempt to detect malware on Android devices using a machine learning approach that is powered by TensorFlow. We use a two-layer neural network trained with a carefully selected set of features. The neural network is tuned in such a way that it performs efficiently on mobile devices where computational resources are limited. Tests show that LibreAV performs efficiently and effectively even on low-end mobile devices. With LibreAV, you can scan all the installed apps in your devi
  3. U-VPN (Free Unlimited & Very Fast & Secure VPN) v3.6.0 (Ad-Free) (derrin Mod) U-VPN is super fast VPN service using a new technology. U-VPN is the ultimate Android VPN. It is 100% free unlimited VPN. Easy to use, One click to connecting to U-VPN server. U-VPN is completely anonymous. All of your traffic is encrypted and not logged at all. U-VPN give you unlimited bandwidth and unlimited free trial time. U-VPN protect your privacy and keep you safe from 3rd party tracking. Unblock geographically restricted websites through U-VPN serve
  4. AdGuard for Android version 4.0 nightly 1 AdGuard is a unique no root ad blocker for Android that removes ads in apps and browsers, protects your privacy, and helps you manage your apps. Blocks ads everywhere Block throughout the whole system. This includes video ads and ads in your favorite apps, browsers, games, and on any website you can imagine. Dozens of ad filters are available to you and are updated on a regular basis, guaranteeing the best filtering quality. Cares about your privacy We value the privacy of your personal data ab
  5. Mine is extremely light, but undoubtedly powerful. Here is my setup: Defensewall ShadowDefender Keyscrambler Sandboxie (custom rules) (A2, SAS, MBAM used rarely, on demand)
  6. You Can Now Check If Your ISP Uses Basic Security Measures “Is BGP Safe Yet” is a new site that names and shames internet service providers who don't tend to their routing. BGP is like a GPS mapping service for the internet, enabling ISPs to automatically choose what route data should take.Photograph: Tommy Lee Walker/Getty Images For more than an hour at the beginning of April, major sites like Google and Facebook sputtered for large swaths
  7. Major vulnerabilities found in top free VPN apps on Google Play store SuperVPN Free VPN Client is one of the most popular free VPN apps you can find on the Google Play store, having gained more than 100 million installs already. But besides being a very popular app, there’s something else you need to know about this free VPN: SuperVPN Free VPN Client is also very dangerous. You see, our analysis shows that this app has critical vulnerabilities that opens it up to dangerous attacks known as man-in-the-middle (MITM) hacks. These vulnerabilities will allow hackers to
  8. Apple Just Made A Striking New Security Move That Could Impact All Users Apple has made a move that could make all users more secure with a new approach to passwords. AFP/GETTY IMAGES As a standalone form of authentication, passwords are pretty poor. Passwords are exposed in data breaches, people forget them, use insecure credentials and repeat them across services. It’s with this in mind that Apple has just made a bold move to try and help all users move away from passwords alone, and towards more secure forms of authentication, such as security keys.
  9. The year 2018 saw several tech companies working hard and delivering some of the best biometric authentication tech on devices. Until now we have seen iris scanner, face scanners and optical fingerprint scanners securing content on devices. However, there’s a new biometric tech that is hardly used anywhere – vein authentication. And this too has been hacked. For those unaware, ‘vein authentication’ tech recognises the placement of user's vein under the skin. It also scans the shape and size of the vein under the user’s skin. But then hackers have found a way to bypass this tech as well by s
  10. System Mechanic Pro 18.5.1.208 System Mechanic is a program whose undoubted advantage is its versatility. Contains more than 50 applications designed to diagnose, fix errors and optimize the performance of your computer. Among the features worth highlighting disk defragmentation, correction of system registry errors, recovery of deleted data, cleaning of useless files, an increase in the operating system speed and speed of the Internet connection. Using these and a number of other highly specialized utilities, the work of your computer will always be at its best. D
  11. This tool is intended to check all files from system Autostart on VirusTotal. It is simply a launcher for Mark Russinovich's Autorunsc. AutorunsVTchecker was made for remote help with infected system. You don't have to ask user to check each different file separately and don't have to explain how to do it. You just have to give user a link to download and run it. When it ends checking, it'll show appropriate message. Helper should see needed report on virustotal by file hash. No logs. If you still need an Autoruns log, it is better to get it through the Autoruns GUI. First st
  12. With the launch of a new national cyber strategy, President Donald Trump has authorized the use of “offensive cyber operations” against U.S. adversaries, National Security Adviser John Bolton told reporters on Thursday. The U.S. hopes by deploying offensive measures it can deter cyberattacks targeting critical infrastructure and other systems, Bolton said, by demonstrating to adversaries that the cost “is higher than they want to bear.” In a letter, Trump said the new guidelines demonstrated his commitment to securing America from digital threats. “It is a c
  13. HandyPAF

    Noralabs Norascan 3.3

    Scans and detects malware, spyware, and other threats. Noralabs Norascan is an antivirus application built specifically for helping you scan the computer for potential threats. Sometimes, even if you use a good antivirus application, malware, spyware, and other threats may infiltrate into your computer without even being able to detect their presence. The tool provides two different scanning modes, namely quick or full. Of course, the first one is the fastest one because it scans only some locations from your computer. The full mode is the most comprehensive
  14. The secrecy surrounding the work was unheard of at Google. It was not unusual for planned new products to be closely guarded ahead of launch. But this time was different. The objective, code-named Dragonfly, was to build a search engine for China that would censor broad categories of information about human rights, democracy, and peaceful protest. In February 2017, during one of the first group meetings about Dragonfly at Google’s Mountain View headquarters in California, some of those present were left stunned by what they heard. Senior executives disclosed that the se
  15. Yahoo Mail and AOL Mail, which both fly under the Oath banner, a Verizon owned company, scan emails that arrive in user inboxes to improve advertisement targeting. An article published by The Wall Street Journal (sorry, no link as it is paywalled), suggests that Oath's email scanning may go beyond what users of the service may deem acceptable. According to the article, Yahoo is scanning commercial emails of all free users who did not opt-out of personalized advertisement to improve targeted advertising. Yahoo creates profiles of users by assigning them to ce
  16. More than half of professionals think they have a good shot at a successful insider attack. Computer professionals may think their enterprise security is good, but they think their skills are better. In fact, almost half think they could pull off a successful insider attack, according to a new report by Imperva. Indeed, 43% of the 179 IT professionals surveyed said they could successfully attack their own organizations, while another 22% said they would have at least a 50/50 chance at success. When it came to the attack surface, only 23% said the
  17. Bausch

    Nulled Boards.

    Hello everyone, I was wondering about the risks if one opts for using nulled php software on a forum, is it really safe, or there are known cases of backdoors and other risks involved? I am not sure about what is being said that the teams who do the nulling may insert code of their own that would compromise the security of the forum, such could be scare tactics to discourage many from using a nulled board. Also, are there trusted sources for such releases, or if one group is better than another in any way? Thank you.
  18. The Enhanced Mitigation Experience Toolkit (EMET) is a utility that helps prevent vulnerabilities in software from being successfully exploited. EMET achieves this goal by using security mitigation technologies. These technologies function as special protections and obstacles that an exploit author must defeat to exploit software vulnerabilities. These security mitigation technologies do not guarantee that vulnerabilities cannot be exploited. However, they work to make exploitation as difficult as possible to perform.The new EMET 4.0 also provides a configurable SSL/TLS certificate pinning fea
  19. Note: x64 guide in link near the bottom of the article.. Microsoft's official support for the Windows XP operating system ended more than a month ago. While some companies and organizations are still receiving updates for the operating system, end users do not. These companies pay Microsoft for that, usually because they were not able or willed to migrate computer's running Windows XP to another operating system before the extended support phase for the system ended. There is another exception to the end of support rule: Windows Embedded Industry, formerly known as Windows Embedded POSReady, o
  20. How you participate is up to you, but be ambitious! Sites: promise to add HTTPS, HSTS, and PFS this year. Mobile apps: add SSL & cert pinning, including for third party code like ad networks and analytics. Large companies should follow the Encrypt all the Things Data Security Action Plan. Everyone else: promote the privacy pack on June 5th to spread privacy tools! https://www.resetthenet.org/
  21. I'm using an online service that provides a tool to convert my audio files http://www.etyn.com/tools/audio-converter but I know nothing about the safeness of the tool. the site looks good but how can I make sure that it's secure and if it's not how can it harm my PC?? Any help would be greatly appreciated.
  22. Cloud computing services are commonly used in cyberattacks, often to host a malicious payload which a victim is duped into clicking and downlading malware. But two researchers have shown that the cloud can harbour something even more alarming for cloud security – “legal zombies”, ready to rob the internet of gold. Using free cloud application hosting can allow an attacker to create a “free supercomputer” according to The Register‘s report – used to mine cryptocurrency, researcher Oscar Salazar warns – and he predicts cybercriminals will soon use this method, according to Tech Week Europe. Sala
  23. Giveaway Extended for Bitdefender Internet Security 2015 The giveaway ends in 7 hrs.! UPDATE: The giveaway is over As you may or may not know, Softpedia and Bitdefender have put together a giveaway promo over this past weekend for the new av tool, Bitdefender Internet Security 2015. However, the developer's website had some server issues last night that prevented users from claiming their free key for the application. Therefore, Bitdefender has decided to provide extra time for those unlucky ones who haven't got a chance to obtain a license. In other words, there are a few more hours add
  24. Suspect operated the iotaseed.io portal that generated and secretly logged passwords for IOTA wallets. Europol, German, and British authorities have announced today the arrest of a British national who they believe is behind the theft of more than €10 million ($11.4 million) worth of IOTA cryptocurrency. The man, whose name has not been released yet, is believed to be the main culprit behind a wave of IOTA thefts that occured in January 2018. According to reports from last year, the hacker, who used the nickname of "Norbertvdberg' while providing
×
×
  • Create New...