Melina

/Web master

About Web master

This author has not yet filled in any details.
So far Web master has created 27 blog entries.

The Top Cyber Security Blogs and Websites of 2017

If you work in the cyber security industry or are interested in getting into the field, it’s important to stay up to date on the latest trends and advancements. Reading blogs and checking in on popular websites is one of the best ways to do that. Here are a handful of our favorite cyber security [...]

By | May 29th, 2017|Blog, Cyber-Security|0 Comments

The Top Cyber Security Blogs and Websites of 2017

If you work in the cyber security industry or are interested in getting into the field, it’s important to stay up to date on the latest trends and advancements. Reading blogs and checking in on popular websites is one of the best ways to do that. Here are a handful of our favorite cyber security [...]

By | May 29th, 2017|Cyber-Security|0 Comments

Malicious malware on Android phones

Malicious malware and ransomware found pre-installed on 38 Android phones by two companies Security researchers have found a "severe infection" in 38 Android devices belonging to two unidentified companies that were riddled with an assortment of malware. According to security firm Check Point's Mobile Threat Prevention team, the malware were pre-installed on the devices before [...]

By | March 12th, 2017|News|0 Comments

The CIA Hacking Files

7 Things That Happened After WikiLeaks Dumped The CIA Hacking Files This week WikiLeaks published "Vault 7" — a roughly 8,761 documents and files claiming to detail surveillance tools and tactics of the Central Intelligence Agency (CIA). The leak outlined a broad range of flaws in smartphones and other devices that the agency uses to [...]

By | March 11th, 2017|Cyber-Security|0 Comments

The CIA Hacking Files

7 Things That Happened After WikiLeaks Dumped The CIA Hacking Files This week WikiLeaks published "Vault 7" — a roughly 8,761 documents and files claiming to detail surveillance tools and tactics of the Central Intelligence Agency (CIA). The leak outlined a broad range of flaws in smartphones and other devices that the agency uses to [...]

By | March 11th, 2017|Cyber-Security|0 Comments

Tor does not want to depend

Tor does not want to depend on government money, starts crowdfunding campaign for funding In order to lessen its dependence on U.S. government donations, private communication network Tor, the network that facilitates hidden communications and secure Internet activity has launched a campaign seeking crowdfunding for its work. According to The Verge, currently up to 90 percent [...]

By | January 19th, 2017|News|0 Comments

10 Best Remote Desktop Software Alternatives For TeamViewer

Here Are Top 10 Remote Desktop Software Alternatives For TeamViewer Ever since TeamViewer got hacked, security experts are warning users to ditch it or face problems. The reason is that TeamViewer is being used as a vector of attack. This has happened on other sites where they had no critical information and within 48 hours everyone’s [...]

By | January 18th, 2017|News|0 Comments

Google Brazil hacked through DNS hijacking

Google Brazil hacked through DNS hijacking, Google.com.br unavailable to users In what seems to a case of DNS hijacking, the Google’s Brazil website, Google.com.br was hacked by a lone hacker. This Google website hacking incident comes after Pakistani hackers had similarly hacked Google Bangladesh website in the 2nd week of December. The Google Brazil was [...]

By | January 18th, 2017|Cyber-Security|0 Comments

YouTube now supports live videos, 360-degree videos in 4K resolution

Until now, Google-owned YouTube has supported 4K resolution video playback And now, the video sharing website has introduced 4K Ultra HD resolution support for live streaming videos as well. Not only for standard videos, but 4K resolution is now available for 360-degree videos as well. "Supporting this new format will let creators and partners stream [...]

By | December 4th, 2016|Blog, News|0 Comments

Family safety

All you need to know about the worrying popularity of Malvertising Every morning, without fail, you log onto your computer and check your emails, read the news, and have a look at your social media accounts. While you do this it is likely that you’ll come across a few pop-up advertisements which you quickly close [...]

By | October 29th, 2016|Blog, Cyber-Security|0 Comments