Tag Computer security - results: 18

How to maintain your anonymity on the Internet (and a good save)

How to maintain your anonymity on the Internet (and a good save)

it May seem that lately, VPN services have become very much, but actually their number is slightly increased — just the need for gaining access to the particular site has increased dramatically. Besides, in order to use the ...

87

1 0

2018-11-06

Comments:
0
IBM will use AI to address problems of cybersecurity

IBM will use AI to address problems of cybersecurity

In recent years, hackers and other cybercriminals invent new means to steal data or harm to companies and individuals. And sometimes to protect standard techniques are no longer enough, but to secure cyberspace has solved a major ...

130

1 0

2018-10-16

Comments:
0
Google wants to

Google wants to "kill" the URL in the name of security users

Google Engineers are going to arrange another reform on the Internet. The Google Chrome browser already eradicates the HTTP Protocol, marking using his sites as unsafe and forcing administrators to move to HTTPS encryption. Accord...

191

1 0

2018-09-06

Comments:
0

"Kaspersky lab" will not cooperate with Europol

"Kaspersky Lab" has carried out a reversal in the direction of Russia and decided not to cooperate with European law enforcement agencies, including Europol. This is due to the recently adopted European Parliament resolution on st...

203

1 0

2018-06-14

Comments:
0
Half a million routers can be turned off VPNFilter

Half a million routers can be turned off VPNFilter

Researchers in the field of security recently discovered that at least 500 thousand routers in service among ordinary users and companies infected by malware VPNFilter, the previous version which was previously spread on the terri...

260

1 0

2018-05-24

Comments:
0
What have you learned about the attack on 200 000 network of Cisco switches?

What have you learned about the attack on 200 000 network of Cisco switches?

the Last few days were not the best for cyber security. The Iranian Ministry of communications and information technologies reported that it has also become a victim of global cyber-attacks that (or simply switches) from Cisco, wh...

254

1 0

2018-04-08

Comments:
0
Intel will no longer defend some of their processors from vulnerabilities

Intel will no longer defend some of their processors from vulnerabilities

At the beginning of this, as of 2018, some processors of Intel was discovered that allowed attackers to steal user data which are processed in the processor. Immediately representatives of Intel said that will work on a "patch" th...

317

1 0

2018-04-06

Comments:
0
Employees of

Employees of "Kaspersky Lab" found unkillable computer virus

Almost every day on the world wide web to discover some new computer viruses. And very seldom happens so that viruses cannot be destroyed. Moreover, a rare virus is able to hide the years, from anti-virus developers. But, accordin...

527

1 0

2018-03-13

Comments:
0
Avast has developed an AI system for the protection of IoT from the rest of the miners

Avast has developed an AI system for the protection of IoT from the rest of the miners

Hidden cryptocurrency is starting to become more rampant. Hackers earn money using for mining other people's computers, smartphones and other «smart» device. At the world mobile Congress company Avast said about the exte...

338

1 0

2018-03-02

Comments:
0
Servers on Linux and Windows massively affects virus-miner

Servers on Linux and Windows massively affects virus-miner

cybersecurity Experts from companies Check Point, Ixia and Certego found that more than 700 servers on Windows and Linux infected by malicious software RubyMiner used for covert cryptocurrency. The first attack was noticed last we...

411

1 0

2018-01-18

Comments:
0
DARPA resumed work on the

DARPA resumed work on the "uncrackable" computer Morpheus

Cybersecurity in recent years has become particularly relevant for investment not only large corporations, but also the military. In light of recent events, when the worm WannaCry suddenly knocked out more than 300 000 computers w...

381

1 0

2017-12-21

Comments:
0
Named list of the worst passwords of 2017

Named list of the worst passwords of 2017

the Company SplashData, specializing in providing information security services, annually makes the list of most popular passwords, based on millions of stolen logins, which end up in open access. And every year we never cease to ...

355

1 0

2017-12-20

Comments:
0
Yesterday's virus-extortionist was supplemented and amended NotPetya

Yesterday's virus-extortionist was supplemented and amended NotPetya

Virus-cryptographer, tried to attack Russian banks and infected the computers of a number of Ukrainian organizations and the Russian media, called BadRabbit. Specialists of the company «Group-IB», analyzed it, pointed ou...

498

1 0

2017-10-25

Comments:
0
What will happen to bitcoin in 2020?

What will happen to bitcoin in 2020?

Almost exactly a year ago one bitcoin gave about 580 dollars. Add the word "only" the hand is not rotated, since the exchange rate against the us dollar can not boast of any one currency in the world. Now the cryptocurrency is tra...

515

1 0

2017-09-04

Comments:
0
Malicious code written in the DNA that can infect computers

Malicious code written in the DNA that can infect computers

This was expected, since the moment when scientists upload digital information macromolecules of deoxyribonucleic acid. For the first time, researchers were able to infect the virus the computer, analyze the DNA, which had made th...

383

1 0

2017-08-10

Comments:
0
What is the

What is the "Cloud of Siberia" and "energy of the future"?

the Modern world is increasingly difficult to imagine without the cloud. They are all plugged into our lives and apply to all spheres of human activity. The other day in Irkutsk was a critical step in the development of this indus...

401

1 0

2017-06-02

Comments:
0
Computers, many countries were attacked virus-the extortioner

Computers, many countries were attacked virus-the extortioner

Today, the Network began to appear reports that in the internal computer system of the Ministry of interior raging virus ransomware, encrypting data and demanding money for decryption. If you do not buy «pick» at the app...

598

1 0

2017-05-12

Comments:
0
Google has figured out how to make reCAPTCHA invisible

Google has figured out how to make reCAPTCHA invisible

to Be a robot in our days is becoming increasingly difficult. The ingenious developers of websites and web services to create more sophisticated checks on the activities of bots in the Network. If before we were forced to introduc...

597

1 0

2017-03-14

Comments:
0