Tech-News
Is Trump Still Using an Uprotected Phone In Office?Last year Donald Trump was criticised for using an unsecure iPhone for presidential business, and not adhering to the correct security protocols to prevent malware infection. The Washington Post alleged that President Trump has been warned not to use his personal phone in case it is hacked, but he still carries it, and makes […]
8th March 2019
Tech-News
More Accusations of Chinese Spy ChipsSpies based in China have been planting secret chips inside electronics destined for the USA, according to Bloomberg, in a highly coordinated hacking project. The website reports that tiny microchips appear to have been added to motherboards at the point of manufacture, and those motherboards have ended up in servers in some of the […]
8th March 2019
Tips & Advice
Are Browser Extensions to Blame for Last Years Facebook Hack?Hackers are selling private messages from 81,000 Facebook accounts online, according to BBC report. Facebook claims that there has been no security breach, and says that the messages were probably scraped up by browser extensions that have accessed content during normal browsing sessions. The BBC reported in November that hackers claim to have […]
8th March 2019
Industry Latest
Cloudfare Ditches Captchas for Tor UsersIf you regularly use Tor to ensure your privacy while browsing, you’ve probably noticed that you frequently meet a Cloudflare ‘challenge’ when trying to access certain websites. Sites that use Cloudflare have been automatically rerouting Tor users to these CAPTCHAs to ensure that traffic is genuine and not malicious. But for many users, […]
8th March 2019
Tech-News
Hacker Pleads GuiltyBy Mark Phillips ¦ Blog.TotalAV.com ¦ Updated 2nd May 2017, 09.11 EDT Mark Vartanyan, who was accused of aiding the development and distribution of malicious software designed to steal financial details, has pleaded guilty on a computer fraud charge. Vartanyan, who used the online alias ‘Kolypto’, was arrested in Norway back in October 2014, and […]
8th March 2019
Industry Latest
Fresh Cyber Attack!By Mark Phillips ¦ Updated 26th October 2017, 05.12 EDT In what is becoming yet another startling addition to a year plagued by numerous high-profile cyber attacks, Europe has been hit by a new wave of ransomware. The malicious software, which has been branded ‘Bad Rabbit’, follows the same modus operandi of other strains before […]
8th March 2019
Tech-News
Cyber Threat Is BackBy Mark Phillips ¦ Updated 28th June 2017, 05.12 EDT A new major malware attack has started to spread rapidly, crippling major organizations by locking down PCs and holding the data to ransom. Hackers have launched a new strain of ransomware virus, known as ‘Petya’, designed to hijack a victims’ computer by encrypting their files, […]
8th March 2019
Tech-News
New Worldwide ThreatBy Mark Phillips ¦ Blog.TotalAV.com ¦ Updated 30th May 2017, 08.16 EDT In yet more harrowing news, a Croatian researcher has discovered a new worm, known as EternalRocks, that utilizes seven stolen hacking tools from the NSA. The malware shares characteristics with WannaCry, and could potentially pose an even greater threat than the already notorious […]
8th March 2019
Security & Privacy
HACKERS STILL ACTIVEBy Mark Phillips ¦ Blog.TotalAV.com ¦ Updated 22nd May 2017, 06.14 EDT The Shadow Brokers, who recently became one of the world’s most notorious cyber attack groups after leaking a stolen hacking tool from the US National Security Agency, is threatening to release even more tools. In a harrowing message, the group raised alarm bells […]
8th March 2019
Tech-News
WORLDWIDE VIRUS HITSBy Mark Phillips ¦ Blog.TotalAV.com ¦ Updated 15th May 2017, 07.31 EDT If any further proof was needed of ransomware’s continual threat in today’s world, it’s now being splashed across international headlines following a mass-scale global attack. Britain is renowned for its top-tier public health service, the NHS, but many of its hospitals have now […]
8th March 2019
Industry Latest
Fake Netflix App Hacks SmartphonesBy Mark Phillips ¦ Blog.TotalAV.com ¦ Updated 20th April 2017, 07.31 EDT Like many of the world’s leading streaming services, Netflix has a hugely popular app available to its many users. But hackers have been preying on users who are quick to download and install apps without double-checking for developer authenticity. Cyber security professionals have […]
8th March 2019
Security & Privacy
Gmail Phishing ScamBy Mark Phillips ¦ Blog.TotalAV.com ¦ Updated 25th April 2017, 06.514 EDT Phishing scams have long been plaguing email providers and their millions of users, and Gmail is the latest to take a hit from hackers. Described as one of the most convincing to date, the scam lures unsuspecting users into entering their login information, […]
8th March 2019
Security & Privacy
Ransomware Hits WhatsappBy Mark Phillips ¦ Blog.TotalAV.com ¦ Android users are being urged to remain vigilant when downloading apps, especially since a new form of ransomware has been discovered. GhostCtrl, a malicious software with the means to secretly record its users, is being spread by disguising itself as popular apps such as WhatsApp and Pokemon […]
19th February 2019
Security & Privacy
Why Business Cyber Attack Security is ParamountBy Mark Phillips ¦ Blog.TotalAV.com ¦ Countless corporations fell victim to cyber attacks last year, a fact made very public by international headlines. Ransomware attacks – essentially malware that holds a system’s data hostage until a ransom is paid – soared to 4000 per day through 2015 to 2016, according to the U.S. Department of […]
19th February 2019
Security & Privacy
Android Apps Sharing Millions of Users’ Private DataBy Mark Phillips ¦ Blog.TotalAV.com ¦ Android apps are utilized by many in our day-to-day lives, but new research has revealed that they are “secretly colluding” to share data without asking for user consent. This sharing could pilot security breaches, leaving contact and location details, among other private information vulnerable. According to researchers at Virginia […]
19th February 2019
Tech-News
Why using a VPN connection is becoming increasingly important?By Mark Phillips ¦ Blog.TotalAV.com ¦ Even the smallest businesses are reaping the benefits of installing and using virtual private network (VPN) hardware/software. And that’s why using a VPN connection is becoming increasingly important. Why? VPNs can extend a business network to include home-based or mobile workers, so those employees can securely access applications, […]
19th February 2019
Industry Latest
Why is keeping your software up to date important?By Mark Phillips ¦ Blog.TotalAV.com ¦ Why is this happening again? That pesky pop-up message telling you to update your OS software is staring at you, begging for you to make a choice: “update now” or “remind me later”. What do you do? You choose the ever-tempting “remind me later” option, but we all […]
19th February 2019
Security & Privacy
Yahoo Hacked!By Mark Phillips ¦ Blog.TotalAV.com ¦ Giants of the internet world have long been victims of hacking, and Yahoo’s breach will come as a distressing headline for millions of its users. The tech corporation, best known for its global search engine, email and other online services, has recently revealed yet more jarring news. Back […]
19th February 2019
Tips & Advice
When Location Tracking Becomes a Risk to PrivacyLocation tracking can be a genuinely useful tool. On your phone, it can help to find services close by, or locate the device if you lose it. On a computer, location tracking could help a website deliver more relevant content based on where you live. But how many people have access to this location data? […]
19th February 2019
Tips & Advice
What is two-factor authentication and how can does it help me stay secure online?By Mark Phillips ¦ Blog.TotalAV.com ¦ One of the best pieces of security advice any computer expert can give you is to enable two-factor authentication where possible. Nowadays, with password breaches being so common, it could be the one thing that keeps away hackers from stealing your online identity. Two-factor authentication or two-step verification? A […]
19th February 2019