General

Improve your browser’s security and privacy in 5 steps

No matter which source for statistics you take, all agree that the most used browsers are Chrome, Firefox and Internet Explorer.   There have been many studies and tests done to find out which is the most secure of them. However, the tests are able only to show how each browser is matching a set of […]

General

Link shortening service Bitly hacked, users asked to reset credentials

Link shortening service Bitly late Thursday announced it has suffered a data breach, and urged all users to reset their credentials.  Bitly’s CEO wrote in the blogpost that they have “reasons to believe that Bitly account credentials have been compromised; specifically, users’ email addresses, encrypted passwords, API keys and OAuth tokens”. This is really bad because it […]

General

One month beyond the end of support of Windows XP

It is now a month since the official support from Microsoft has ended for Windows XP. Read here about strategies to move away from it. In the meanwhile, all XP users are getting this message: If you click on the link in the above picture, you see this page where you are kindly explained to move away […]

General

Microsoft fixes the Zero-Day exploit for IE 6 to 11, also on Windows XP

We wrote about the new Zero-day vulnerability in the Internet Explorer affects all IE Versions from 6 to 11 which is being exploited in limited and targeted attacks. This vulnerability, identified as CVE-2014-1776, could allow remote code execution even if the user doesn’t click on anything. Microsoft kept their promise and fixed the problem in only 5 days after informing the […]

General

What you need to know about the OpenSSL vulnerability “heartbleed”

At the beginning of this week a new vulnerability in OpenSSL called Heartbleed was made public. OpenSSL is the library used by most computers to encrypt data sent across the Internet and not only. OpenSSL is perhaps the most widely deployed SSL library and appears in a wide variety of applications, including a number of Linux distributions (see […]

General

Aktivierung der Zwei-Faktor-Authentifizierung bei Tumblr

Immer mehr soziale Medien, aber auch andere Webseiten, nutzen die Zwei-Faktor-Authentifizierung, um ihre Nutzer besser schützen zu können. Nach allen anderen großen Webseiten macht nun auch Tumblr diesen Schritt.     Befolgen Sie folgende einfache Schritte, um die Aktivierung durchzuführen: Gehen Sie zu Ihren Kontoeinstellungen. Klicken Sie die „Zwei-Faktor-Authentifizierung“ Schaltfläche an. Geben Sie Ihre Telefonnummer ein. Nun […]