Beware of Fake Facebook profiles

Nov 21, 2017 | Blog

Many of us at least once, received friend request from a fairly suspicious account, in other words fake. Most of those fake accounts are using stolen photos of young women or men and teenagers, tagging other fake accounts in their post and pictures. This is officially called “Catfishing”, which is an Internet term for scamming, creating fake online profiles in order to seduce a victim into a fictitious online relationship, for whichever benefit, money, sex or something more. Catfishers are usually looking for a particularly vulnerable and eager user open to emotional manipulation. After the scammer settles on a mark, a process of trust building begins which can take anywhere from a few days to months or even years. However, recently there has been a discovery for a major fake Facebook profile industry. And yes, you read it good - Industry. The whole idea about fake accounts got so big that it created a whole industry.

Twitter will expand tweets to 280 characters!

Nov 17, 2017 | Blog

Twitter has announced that it’s planning to increase the number of characters in tweets from 140 to 280 for the majority of users. However, the new limit will not apply to tweets written in Japanese, Chinese and Korean, because they can carry more information in a single character than other languages. Asian languages fit more thoughts into fewer characters, as the average length of a tweet in Japanese is 15 characters. The company’s decision came after a 280 character trial run that began in September. The main reason for this was that the people, spent a lot of time editing and even sometimes abandoning Tweets before sending. With the expanded character count this problem was massively reduced, and it allowed users to send their Tweets faster than before. This will also attract new users and increase growth.

Go Incognito and Browse in Private

Nov 15, 2017 | Blog

Did you know that you don’t have to leave a record of the website that you are visiting? And that you can browse any website you want without worrying about your browsing history afterwards? In order to do that you will have to activate Incognito Mode, sometimes also known as Private Mode. The main idea behind using this mode is for example if you’ve downloaded something that you don’t want the next person who uses the browser to see.

Google Adds New Features in Chrome to Fight Malvertising

Nov 10, 2017 | Blog

Google announced plans today for three new Chrome security features that will block websites from sneakily redirecting users to new URLs without the users or website owner’s permission. One of these features will have a potential to stop malvertising attacks. Google said that these features will be focusing on preventing malvertising campaigns and that it could potentially disrupt the malware scene in the next few months. The company said that the feature will be released in January 2018 with new Chrome 64.

Fake WhatsApp App Attacks 1M Downloads

Nov 07, 2017 | Blog

The Google Play Store has always been filled with malicious and copycats of legitimate apps. The most recent case was with fake Android app that was pretending to be WhatsApp. This App managed to deceive over 1M people using the name “Update WhatsApp Messenger “ while copied the developer’s title “Whats App Inc”, the same title that actual Facebook-owned chat messenger uses on Google Play.

Facebook, as an integral part of life

Nov 02, 2017 | Blog

Over ten years and billion users, there is no question that Facebook has changed our lives. For many young people, Facebook is a normal thing to have and use on everyday basis, and not just once a day. Many of the same young people uses Facebook to portray themselves as they want others to see them. Which can lead to the fact that many of us, and this doesn’t include only young people, but all generations, is more focused on taking pictures to create the Facebook persona and show that they had a good time, rather than existing in the moment.

Internet Security Tips for Dummies

Oct 31, 2017 | Blog

No matter if you are a junior or senior PC user, the Internet is full of interesting sites, and tons of information that is available to you at any time, but it is also full of suspicious characters you need to guard against. No matter if you are a casual Internet user or experienced one you should read our security tips and tricks in order to stay safe on the Internet, and to understand better to how the Internet works.

Google will pay you $1,000 to hack Android’s popular apps

Oct 20, 2017 | Blog

Google is well known for maintaining various reward programs for its own apps and services like Chrome and Android. Today, Google has launched a bug bounty program for popular apps available on its Play Store. This will encourage researchers to poke around and look for vulnerabilities in some of Android’s most popular apps, including those built by Google and those built by third party developers.

Samsung’s Device Can Track Your Kids and Pets For You

Oct 17, 2017 | Blog

Samsung’s GPS smart tag called Connect Tag, and first of its kind to use narrowband technology can help you track your kids and pets for you for 7 days on a single charge. Narrowband network technology uses a small amount of data, has a low power consumption rate and has the ability to securely connect online for location services. The Samsung Connect Tag provides location information both indoors and out using GPS, Wi-Fi based positioning and cell ID for location tracking.

Don’t Be an On-line Victim: Top 5 On-line Scams

Oct 13, 2017 | Blog

We can’t imagine life without Internet. It is something that we are all using on a daily basis, and something that is making our life easier to accomplish many things such as banking, research, travel, personal interests and shopping. But wherever we go, and whatever that we do on the Internet, we are leaving our virtual fingertips which scammers, hackers, con artists and other online miscreants can use to take advantage of.

Windows Phone is officially dead

Oct 10, 2017 | Blog

Microsoft’s mobile platform and probably the only platform that came close to being a serious competitor to iOS and Android, in the post-BlackBerry era will be no more. Windows Phone will no longer develop new features or new hardware for Windows Mobile. Microsoft Corporate VP of Windows Joe Belfiore officially confirmed that the company’s smartphone operating system is dead. Even tho this isn’t much of a shock, and it was something to be expected, Windows Phone fans hoped it won’t be true.

Microsoft Edge available now for iOS and Android

Oct 06, 2017 | Blog

Microsoft announced yesterday that its Edge web browser is available for iOS and Android, starting with a beta version for iPhone, available already today. The new browsers are Edge in name only, they will provide a user interface that looks like Edge, and they will sync with user’s Microsoft Account, but they will not use the Edge rendering engine from the PC. This mobile version will include access to favorites, history, a reading list and e-books, but the tabs and history of what you browse on your smartphone will not be shared to desktop version of Edge yet.

What is Adblock, How to use it and When?

Oct 03, 2017 | Blog

Before we start talking about AdBlock first lets jump into some definitions like what is an extension. Extensions are small software programs that can modify and enhance the functionality of the browsers. They have little to no user interface and they are a plug-in that extends the functionality of a web browser and modify your web pages. Extensions can do many things, they are like any other piece of software, although very limited. The best place to start searching for an extension that you’d like would be Google Play store, if you are Chrome user or Add-ons for Firefox users, for example.

Internet Explorer Bugs Leaks Your Browsing Secrets

Oct 03, 2017 | Blog

The latest version of Internet Explorer carries a bug that reveals to the malicious websites what the user is typing in the address bar, search terms or any other text typed into the URL area. This Internet Explorer’s flaw is allowing the website which user is currently visiting to view the text typed in the address bar. As soon as the user hits Enter key, the website will stop and redirect to a simple page explaining that it has “read your mind” and displays your browser’s next destination. This means that the bug can expose sensitive information, not only Web address but also search queries and other user’s browsing habits, since Internet Explorer can bring up search results from Bing or other search services when a user types keywords in the address bar.

Speed up your Windows 10, Today!

Sep 15, 2017 | Blog

One of the things that we all dislike nowadays is a slow computer.  At that point we are all thinking on how much money it will cost us on improving our computer, on adding RAM, buying a faster SSD or new graphic card. But before doing that, there are few things that we can do to make our Windows faster without spending a single dollar. We present you 5 ways to speed up you Windows 10. Reboot your PC No matter how obvious this seems, people tend to forget even the obvious things. Restarting or rebooting your PC will remove some of the slow behaviours, but most importantly it will fix a low-level error because the problem code can start over again.  Essentially, when you restart your computer, you are clearing off the current state of your software and starting over again, as well as dumping out the junk and starting over again fresh.  The sleep or hibernate setting will save power, but a reboot will give your Windows a fresh start. It is highly recommended to be done...

iPhone8 News, Release date and more

Sep 12, 2017 | Blog

iPhone fans should be pleased to hear that the long awaited iPhone8 is officially launching in a week.  iPhone8 is the 10 th anniversary version of Apple’s iPhone, with a huge screen and a smaller glass body. The release date and price will be announced on 12 th September at the new Apple campus in California.  As always, Apple will stream the event live on its website, which will be held at the Steve Jobs Theater in Cupertino, California.  Apple has released a new iPhone in September every year, but what makes this year different than the previous ones is that we are expecting three new iPhone models to launch at once. How much will iPhone8 cost? - Some analysts have been predicting that the price of iPhone8 will probably be up to $1,000, and yet there is still a chance to be sold out in under five minutes, as the iPhone8 looks set to be the most expensive smartphone ever. What will iPhone8 look like? - The rumors regarding specs are that the iPhone8 will feature a...

Google Drive Desktop app says Goodbye

Sep 12, 2017 | Blog

Google today announced in a blog post that one of the longest running Google features will completely be removed. Support for both Windows and macOs versions will end on December 11 th and the app will be shut down completely on March 12 th , 2018. A far enough date to give enterprise customers plenty of time to make the switch. Millions of users around the world will begin to see “going away” notifications in October.  However, Google Drive the service isn’t going anywhere, it will still be accessible from the web and smartphones app. So what is exactly changing? The termination of Google Drive has been on the cards for quite some time now. Starting from next month, Google will begin to seriously push new app which appears to be a significant upgrade on the old Google Drive app. This sophisticated and integrated approach will save space on user’s local drives, as well as time, while having access to all of their files on demand, directly from computer. Google announced...

Google Chrome will soon provide “Man in the middle” attack warnings

Sep 12, 2017 | Blog

The search giant never cease to surprise us, this time with new Google Chrome security update which will come with new version of Chrome 63 browser, set to be released on December, 5th. With the upcoming update Chrome browser will be able to detect if the third-party software is performing a “Man in the Middle” attack that intercepts communication between two systems, in other words hijacks the user’s Internet Connection. “A Man in the middle attack” happens when a malicious actor through an application installed on a user’s computer intercepts the user’s web traffic, making it available for him to send, and receive data meant for someone else.  This isn’t an easy thing to prevent, mainly because most of the "Man in the Middle" toolkits fail to correctly rewrite the user’s encrypted connections, causing SSL errors that Chrome can detect. This new Chrome63 feature will be in the form of a new warning screen and it will appear whenever Chrome detects a large number of SSL...

Future Computer Security Trends

Jul 07, 2016 | Blog

Computer security is latest and greatest topic discussed nowadays due to the rapidly evolving technology and the huge amount of sensitive information we store in our computers and other devices. Unfortunately there are a lot of hackers and other cyber threats that are out there to get a hold of this data. So to counter this security threat, new trends are always coming up and changing for the better. Therefore we bring some information security trends that you should keep an eye out for: Cloud service is expanding and so are the attacks on private and corporate data   The use of cloud service is constantly expanding meaning that people and businesses are storing more and more valuable data wirelessly. This provides a good opportunity for hackers to crack the code and target endpoints. This can include stealing your passwords, gaining access to mobile devices or the treat to confidential information that these hackers can tamper with or make public. So the best way...

Your Heavy Antivirus Program Can be the Cause of several PC problems, part 2

Jul 04, 2016 | Blog

In our previous blogpost, we explained to you the dangers of having a bulky antivirus program on your PC. It can not only slow down your computer but can cause it to crash, freeze or behave erratically. You cannot go without an antivirus because that would be irresponsible so a good way to avoid these problems while still having your PC protected at the same time is to use a light yet effective software such as PC Cure +. The program solves all the grave issues mentioned above as it is easy on the PC speed. It is most certainly not a resource hog as you will find that simple tasks such as opening your web browser or a Word document are easy to do. They will not take several minutes like all the other antiviruses programs out there. This is all because this particular antivirus allows you to schedule your background scan at any time you want! The real time scan of Antiviruses is generally heavy and extremely time consuming. So when your Anitivirus program decides to do it when...