Technology News on 
Sunday, April 23, 2017
  

Dropbox Responds to Mac ‘Security Risk’ Accusations

Dropbox has said it needs to do a “better job” of communicating its OS X integration, after claims emerged online that its Mac app was phishing for user passwords and even...

All About (Concealed) Data Leakage for Users Like You and Me

Drip, drip, drip… The sound of the leaking faucet called for my attention. Drip, drip, drip… These annoying little drop of water kept reminding me that I had to do something about it. It...

Google breaks down security patches for Android

Google published monthly security updates for Android for about a year which manufacturers get in advance to push out to their devices after integrating and testing the patches. While some manufacturers are...

Samsung Galaxy S7 Security Update Arrives for Unlocked Handsets – How to Get It

Samsung has today pushed out an update for the Galaxy S7 and S7 Edge unlocked/unbranded versions which will improve the Gallery application and Samsung Cloud compatibility, bringing both up to spec...

PayPal Digital Gift Cards code leak

PayPal is not only a dominating force when it comes to making online transactions between individuals and companies, it also branched of in other areas such as gift cards. You may visit...

Avira PC Cleaner review

Avira PC Cleaner is an on-demand scanner that you may use to scan a Windows computer for infections, and remove malicious code that is found by the program. On-demand scanners are often...

McAfee GetSusp: sniff out undetected malware

McAfee GetSusp is a free program for Microsoft Windows devices designed to sniff out malware that resident security solutions did not detect. The program is not new, it was last updated in...

Spotify and the future of passwords

It’s become common for internet services, banks, online retail stores and other firms reporting about a possible security breach to tell users to change passwords. But on Friday, Spotify, the music streaming service,...

Top 10 Internet Security Myths Debunked [Updated]

What do we know about security?Conflicting information and stories on online security are part of the internet culture. Myths are strongly integrated in our general knowledge. Their existence is so closely linked to...

Hong Kong government ‘attacked by Chinese hackers’

Mainland Chinese hackers have attacked two Hong Kong government departments, a US-based security firm said Friday, as the city prepares for a crucial election. The attack occurred in August, in the run-up...

Mid-Year Review: 6 of the Biggest Cyber Threats of 2016

Since these summer days are extremely slow and quiet, I decided to take advantage and write an article I’ve been planning for a while. It’s a review of 6 of the most...

The Hackable Human – 6 Psychological Biases that Make Us Vulnerable

There’s a red thread that you can follow in each story about cyber attacks. If you pay attention, you’ll see how human nature is deeply rooted in the mechanics of successful...

Study: Half of people click on unknown sender links

Phishing is one of the biggest threats on the Internet. Attacks use it to gain access to login or financial information, or to scam users right away. With phishing being a thing...

DNS Security – Why Cyber Criminals Want to Take Over Your Internet Traffic

Sometimes, when I go about my daily tasks, mostly glued to my laptop, I realize that maybe I’m taking technology for granted. Hardware and software are so deeply rooted in our...

Dropbox may have reset your password, just now

If you are a Dropbox customer, you may have received an email from the company informing you that it reset the password of the Dropbox account. The email offers little information about...

Hacked Email: Why Cyber Criminals Want to Get Into Your Inbox

“I don’t care about getting hacked, there’s nothing valuable in my email” If I got a nickel for every time I heard that! It’s the most common reaction I encounter when I...

Misleading Trademark Registration Invoices and Scams

Miscreants are attracted to law-skirting schemes that generate strong revenues without significant ongoing investments. You can observe these characteristics in the trademark registration campaign described below. It seems to have been active for at least a decade...

Weekly Security Roundup #87: Maybe Cyber Crooks Do Take Summer Holidays After All

Last week I wrote a new article explaining how cyber criminals don’t take summer holidays. My main point was: stay vigilant even during the slow, summer days, don’t let your guard...

Announcing the Heimdal Cyber Security Glossary

Not too long ago, I was a total newbie in the cyber security field. Although I understood some of the basics, there was an entire universe for me to explore, from...

Trend Micro Ransomware Screen Unlocker Tool

Trend Micro Ransomware Screen Unlocker Tool is a free program for Microsoft Windows operating systems that helps you unlock the screen after ransomware attacks. As you may know, there are two general...