Poetic malware [Image]
Tech support cleans out a computer when s/he comes across poetic malware... literally.
Tech support cleans out a computer when s/he comes across poetic malware... literally.
If you’re a Google Chrome user and you tend to let your browser save your passwords, take note. Due to poor programming on Google’s part, anyone with physical access to your machine can reveal all your passwords stored...
You may have heard of the recent malware that targeted Freedom Hosting, a hosting provider for Tor, and Tor users. News is now emerging it may be the United States National Security Agency (NSA) that did the attacking. Was it real...
Tor is a tool that protects your identity while browsing the internet. While it is known as the ‘Darknet’ by some due to how it can be used to distribute pornographic and child abuse images, the main purpose of this pr...
Hackers have gone on a rampage recently; these dirty little old men have hacked their way into multiple web servers where they proceeded to upload child abuse images for safekeeping. Hackers borrowing space on a company’s web serv...
Pete likes to watch a lot of porn. Unfortunately, he doesn't know how to watch porn safely.
Uh... how is it possible to be infected with so many malware?!
Since the leak of PRISM by Edward Snowden, there has been a continual stream of information and leaks regarding the activities of the US government. Yesterday we shared with you a story about how US agencies such as FBI and NSA wa...
In a recent development, security engineers from Indiana have hacked into the software of the 2010 models of both the Toyota Prius and the Ford Escape using laptops which were connected to the cars’ electronic systems. This ...
This infographic provides some simple tips as to how/why viruses spread.
A troubling malware family has recently been brought to light by researchers from both F-Secure and Webroot. What is particularly unique about this malware is that it targets both Windows and OSX. This malware appears to be an ear...
Kaspersky TDSSKiller finds one rootkit but somehow neutralizes three.
According to The New York Times, German security researcher Karsten Nohl has found a huge security flaw in an encryption used by mobile SIM cards currently operating in billions of cell phone devices around the world. The flaw in ...
Pro tip: simply inserting your antivirus disc inside the CD tray will protect you from viruses.
Windows users are well versed in the art of malware — viruses, trojans, randsomware, etc. Mac users? Not so much. However, Mac users have recently been the target of a particularly annoying piece of malware or ‘ransomw...