Prima pagina Vizualizeaza site-ul in limba:   RO Romana

Abonare newsletter:

How to create strong, secure passwords by learning how to crack them

Create stronger, more secure passwords: We are nagged to do it all the time, but few of us actually make the effort. Meanwhile, passwords continue to be stolen, leaked, and cracked on a regular basis. So this time we’re hoping to get your attention by looking at it from the attacker’s side!


How Just Visiting A Site Could Have Hacked Your iPhone or MacBook Camera

If you use Apple iPhone or MacBook, here we have a piece of alarming news for you. Turns out merely visiting a website — not just malicious but also legitimate sites unknowingly loading malicious ads as well — using Safari browser could have let remote attackers secretly access your device's camera, microphone, or location, and in some cases, saved passwords as well.


Hacked in Translation – from Subtitles to Complete Takeover

Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim’s media player, attackers can take complete control over any type of device via vulnerabilities found in many popular streaming platforms, including VLC, Kodi (XBMC), Popcorn-Time and strem.io. We estimate there are approximately 200 million video players and streamers that currently run the vulnerable software, making this one of the most widespread, easily accessed and zero-resistance vulnerability reported in recent years.


IT Point Services reseller autorizat

  • Dell partnerdirect registered 2011 rgb
  • Int security i hrz rgb 3000
  • Keriopartner
home » Despre noi » Companie » Suport

Tesladecrypt

Tesladecrypt

 

Tesladecrypt will decrypt TeslaCrypt encrypted files with the following extensions: .mp3, .micro, .xxx, and .ttt.

 

mai mult...


Ransomware Interceptor (Pilot)

Ransomware Interceptor (Pilot)

 

Interceptor is an Anti-Ransomware tool. Interceptor is an early detection tool that prevents file encryption attempts by ransomware malware. This tool leverages heuristics and machine learning to identify such malware.

mai mult...


Shade Ransomware Decryption Tool

Shade Ransomware Decryption Tool

 

This tool can decrypt user files, applications, databases, applets, and other objects infected by the Shade ransomware.

mai mult...


WildFire Ransomware Decryption Tool

WildFire Ransomware Decryption Tool

 

This tool can decrypt user files, applications, databases, applets, and other objects infected by the WildFire ransomware.

mai mult...