News

How to get rid of disturbing and traumatizing “children” films on YouTube

If you have children, then you must allow them from time to time to watch some children films on Youtube. They must have missed some episodes of their favorite series and you definitely can find them there. In any language you want. Just search for “Caillou”, “Barbie”, “Batman” , “Elsa” , “Spiderman” or anything alike and you will get something. There is a huge market for “children’s” YouTube content. But, what happens when the results are not for children?   How do you filter them? You can’t… So, what do you do ? You ban them from using the tablet…

Read More

Why does “everybody” think they are being/were hacked by Russian hackers?

Short answer: See the column “Country”. When I say “Russia”, I mean all Russian speaking countries, from the ex sovietic block. “Everybody” in quotes means the vast majority.   Long answer: Some time ago, I was writing that China is massively attacking my blogs. Now, it seems that the situation has changed a lot. But, what is the reason why this changed? Can it be that the Russian hackers are becoming more aggressive ?  Can be that they are “hungrier”. Or are these attacks sponsored by some entity? It might be, but then why my sites ? 🙂 Or did…


Why most, if not all, “New Generation” endpoint security product are not self-sustained?

Fire Eye, Sentinel One, Crowdstrike, HackerOne, Cylance, Cyphort, Trustlook, Venafi, Clavister, Invincea,  Code42,  just to name a few,  are so called NG Cybersecurity startups. NG comes from “New Generation” or “Next Generation”… (Yeah, just like in StarTrek. 🙂 )   What exactly are these “NG” products and services? There is no single definition that fits them all. Here are the common features: All of them have a cloud backend. Some install an agent on each machine, some install an appliance that acts as a sniffer in the network. Some others must be installed on the default gateway where they take…



How to easily secure your smartphone

Most people these days have a smartphone. These phones are actually no longer just mobile phones, in reality they are powerful mobile computers with several GB RAM, multicore CPUs and many GB storage. Despite these characteristics which bring them closer to computers than to phones, most of their users don’t consider security and privacy in the way they should do with their personal mobile computers. Actually, users are split in two categories: those who care about security and privacy and those who don’t. The advices below are meant to address both categories and they are sorted according to the difficulty…


IT Security News has its own Android App

I have finally found the time to make the app I always wanted to have for the “IT Security News” service.   Here is the page on Google’s Play Store: And the screenshots of the app:       Right now it is available only on Android devices, soon it will be available in the Apple’s Appstore.   Help me spread the word about it so that I can have some downloads 😉 Thanks.


How to get rid of Pokemons in your Facebook feed

Short version For those who are really, really, pissed off: Install FB Purity: http://www.fbpurity.com/ Open the FB Purity Facebook app by clicking on the word “FBP” near the search bar. Write in the main screen the word “pokemon” Save the configuration Enjoy your Pokemon free feed   Longer version Go and install FB Purity from http://www.fbpurity.com/install.htm. This means that you need to install an extension for your browser. F.B. Purity is compatible with the following web browsers: Firefox, Google Chrome, Safari, Opera and Maxthon, running on Windows, Mac, Linux. Open the FB Purity Facebook app by clicking on the word “FBP” near…


Article in German on Focus.de: Smartphone-SicherheitSchutz vor Hacker und Viren: So machen Sie Ihr Handy sicher

Smartphone-SicherheitSchutz vor Hacker und Viren: So machen Sie Ihr Handy sicher Mittwoch, 15.06.2016, 12:24 · von FOCUS-Online-Experte Sorin Mustaca   Zur Person Sorin Mustaca arbeitet seit dem Jahr 2000 in der IT-Sicherheitsbranche. So war er von 2003 bis 2014 bei Avira beschäftigt und dort als Product Manager für Avira Antivir zuständig. Inzwischen arbeitet er als Berater. Mustaca betreibt den Blog http://www.sorinmustaca.com/ Smartphones sind mittlerweile kleine Computer und damit anfällig für Viren und Hackerangriffe. Viele Nutzer machen sich darüber aber keine Gedanken – dabei lässt sich schon mit wenigen Maßnahmen die Sicherheit erhöhen. Handys sind inzwischen mehr kleine Computer als Mini-Telefone. Trotzdem machen sich…


Myspace.com was apparently hacked, 360Mil accounts on sale and nobody knows any details

“Myspace was hacked” writes LeakedSource on their dedicated page for MySpace.com. They do not add any kind of details about this hack except that they received a copy of the data from an email address (not from the hacker). As a matter of fact, there is nowhere on the web any kind of details, not to even say proof, that this has indeed happened. This includes Myspace’s site as well. Leakedsource appears to be the only entity that knows something about these over 427 Mil passwords (for 360 Mil users). But then, Leakedsource only retweets on their wall what two…


Dramatic change to storage limits in OneDrive!

OneDrive’s only advantage in comparison to Dropbox, GDrive and others were:  15 GB of space (OK, Google offers the same, but for all your data, including photos and email) Availability on all types of devices through apps (also non Microsoft) Now, they reduced the space 3 times ! Starting July 27 you get only 5 GBs! I wonder why… Probably due to abuse.   Changes to OneDrive We want to let you know about some upcoming changes to OneDrive. On July 27, 2016, the amount of storage that comes with OneDrive will change from 15 GB to 5 GB. We are also discontinuing…


By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close