Page 1
Security
Standard

Mobile Security: Knock-On Code or Fingerprint Protection?

When it comes to the precious - our mobile phone - we tend to seek ultimate security; and with the new options at hand, we could have a fingerprint sensor or have the revolutionary knock-on code that LG currently offers. What do we prefer? Well both! Each one has its pros and cons, but with the NSA "issues", sometimes you need to reconsider your options. When the fingerprint scanner was released along side the iPhone 5s, everybody was mind-blown by the idea that you will never have to give nor ...
The end
Privacy
Standard

Chadder: A New Encrypted Private Messaging App

Chadder is produced by Future Tense Private Systems, a company founded by John McAfee (yes, "The" McAfee). Chadder is not your average messaging app; its whole purpose revolves around privacy. How? Only the recipient will be able to read the message, with unwanted interceptors only seeing encrypted text. When you first sign up, you do so by providing a nickname, username, and password and then, when you’re in, you should be able to add your email address and mobile number to help people ...
The end
Heartbleed
Standard

Heartbleed: A Worldwide Internet Security Bug

Security researchers have discovered lately a new bug in OpenSSL encryption (that protect many websites) called Heartbleed. OpenSSL is an open source implementation of SSL and TLS that secure a lot of what you see on the Internet. Heartbleed is a bug in OpenSSL that can allow anyone on the Internet to possibly get your name, password and any content you send to websites supposed to be secure. PS: This bug has been there for 2 years, so if a website is not infected today, it may have been in the ...
The end
google-chrome-wallpaper-for-samsung-galaxy-sl-i9003-chromebook-laptop-icon-download-windows-themes-extensions-beta-apps-i
Standard

Security Bunker – Part 6: Google Chrome Privacy and Security Extensions

This is the 8th article in the “PC Configuration and Security” series, and the 6th in the Security Bunker bundle. I will not talk too much about what I will be dealing with, as the title is pretty self-explanatory. All the programs used to accomplish what you will see in those articles are completely FREE. They are used and tested on 64-bit Windows 7 Ultimate, with 4GB of RAM, an Intel Core i5-2430 CPU @2.40GHz (4 Cpu’s) (my current setup). I strongly recommend for you to use a Windows 7 Ultimate ...
The end
AmpedWirelessRTA15_(8)
Standard

Security Bunker – Part 5: Wireless Networks Hacking & Security Tips

Hello Tickers, This is my 7th article in PC Configuration and Security, and the 5th specific article about security. If you missed any of my previous articles, just head toward my author page and check them out. Up until now, we've been discussing PC security and cell phone security… But what about your wireless network at home. If someone brakes in, they will most definitely use your Internet connectivity for free, in addition to being able to use a sniffer to capture all of your passwords. ...
The end
cybersecurity
Standard

Security In a Week – Issue #1

3-10 December 2013 I am back to writing about security, this is my passion after all. So here we are with a totally new article series entitled security in a week. This is a series of article that will posted each week covering security news from all around the globe. Have you ever wished to check all security websites to only find out that there's a lot of reading to do and most of the articles are mainly useless to you? Well no need to worry anymore (hopefully), since I will be doing that for ...
The end
Print
Standard

Security Bunker [Mobile]: A Few Android Internet Security Tips

Hello Tech-Tickers, Here I am, back with some new security tips that will hopefully blow your mind. This is the 6th article in the PC Configuration and Security series. If you missed any of my previous articles, just head toward my author page and check them out. Until now, we've been solely discussing PC security, but you are not totally secure until you have all of your digital life covered. PCs, laptops, routers, cell phones, … Today we will see how we can have a better digital security by ...
The end
password
Standard

10 Tips and Tricks for Better PC Security

Hello Tech-Tickers, This is Jean-Pierre with the fifth article in the series “PC maintenance and security”. If you missed the first four articles, just head to my author page and check them up. This article is the part 3 of the Security Bunker we’re building around our PC. All the programs used to accomplish what you will see in those articles are completely FREE. They were used and tested on a 64 bit windows 7 ultimate operating system, with 4 GB of rams, and an Intel Core i5-2430 CPU @2.40GHz ...
The end
Lavabit
Standard

Lavabit Does Not Want To “Become Complicit in Crimes Against the American People”

Lavabit announced that it would shut down its encrypted email service rather than “become complicit in crimes against the American people.”  This is a special security report: as a security geek I am always on the lookout to try and provide you with the latest news, tutorials, tips and tricks to better protect your digital self. On the 08.08.2013, the world has witnessed the shutdown of Lavabit by the US government. And after the court appeal Lavabit had to close down their services. The ...
The end
Computer Security
Standard

DIY PC Security Bunker – Part 2

This is the fourth article in the series “PC maintenance and security”; if you missed the first three parts, just head to my author page and check them up. All the programs used to accomplish what you will see in those articles are completely FREE. Also they are used and tested on a 64 bit windows 7 Ultimate Operating System, with 4GB of rams, and an Intel Core i5-2430 CPU @2.40GHz (4 Cpu’s). I strongly recommend you use a Windows 7 Ultimate GENUINE operating system-64 bit in addition to 6 ...
The end
Java
Standard

JAVA: Between Security Threat and Necessity

Most of you are used to me writing “PC maintenance and security” related articles, and It was about time I diversified my editing portfolio; Well, no matter how hard I try, it does seem like I cannot wander too far from my predilection segment. So writing about JAVA and its security status can hardly be called a diversification. Still, I try. You certainly used applications that needed JAVA plugins to run. And you certainly even saw some websites not running at all because you don’t have ...
The end
Bunker op Loodsmansduin
Standard

PC Security Bunker DIY – Part 1

Hello Tech-Tickers, This is the third article in the series: “PC maintenance and security”, so if you missed the first two articles, just head to my author page and check them up. This article is the part 1 of the security bunker we’re going to build on our PC. All the programs used to accomplish what you will see in those articles are completely FREE. Also they are used and tested on a 64 bit windows 7 ultimate Operating System, with 4 GB of rams, and an Intel Core i5-2430 CPU @2.40GHz (4 ...
The end
Facebook
Standard

Facebook Security Bug Exposed 6 Million Users’ Personal Information

Facebook announced via their security team that they discovered a bug that reveals some user's contact information to "friends" they did not intend to share with. The site's White Hat team explained that some of the information the site uses to deliver friend recommendations was "inadvertently stored with people's contact information as part of their account on Facebook. We recently received a report to our White Hat program regarding a bug that may have allowed some of a person’s contact ...
The end
Evernote
Standard

Evernote Forces Users to Reset Their Passwords

Evernote, the popular online note-taking application, has announced that it has discovered and blocked some suspicious activity on its servers, leading it to believe that it has been subject to hacking attempts. The App's Operation and Security Team specified that the hackers had only gained access to account details, including usernames, email addresses, and encrypted passwords. However, no data was said to be lost or changed and no payment information was accessed. "In our security investigation, ...
The end
Password
Standard

Google Readying a Physical Password

Passwords are starting to grow weak. Weak and rather predictable. A few combinations of known names, pet names, birthdays dates, and initials are hardly a good protection for your online accounts and identities. This is why Google is working on making future passwords require, well... physical proof. How this can be reached? There are multiple alternatives, of which embedded chips in smartphones (pretty probable) or rings worn on the finger (rather improbable), or basically any other physical device ...
The end
Wallet
Standard

Apple and Its Dream of a Wallet-Free World

Apple was undeniably the most innovative and creative company of the last decade. And this momentum of innovation the California-based firm created for itself was due to the passionate thrive of the late Steve Jobs and the dedication and crazy hard work of a whole team of designers, technicians and engineers. The concept of "ecosystem" was the offspring of Apple's whole product system, building a whole cosmos of applications, services and needs around its main attraction, the iPhone. I always thought ...
The end