Tag Archives: technology

Fobus, the sneaky little thief that could

      No Comments on Fobus, the sneaky little thief that could

One small Android application shows lots of determination and persistence. Too bad it’s evil.   The year 2014 was significant with a huge rise in mobile malware. One of the families impacting our users was malware Fobus, also known as Podec. This malware poses as a more or less useful application, but for sure it […]

12 ways to boost your router’s security

      No Comments on 12 ways to boost your router’s security

With the increasing number of network security breaches, we need to improve awareness regarding the security of your home network. We simply need to follow some rules to control and prevent system penetration and also bandwidth theft (and losing money!). Safeguard your valuable information available through your home wireless connection and do not be easy […]

Network Security 6 – How to disable IPv6 support in your router settings

After the previous articles you should be convinced that router vulnerabilities are one of the major concerns in network security. As you already know, the new Avast 2015 version includes a security feature called Home Network Security (HNS) which scans your network and router for vulnerabilities and prevent threats. One serious problem occurs when when […]

How to change your router DNS settings and avoid hijacking

If your home router is hacked, you have a serious situation on your hands. When an Avast Home Network Security scan finds that your router is already compromised, this notification will appear. This means that the router has been hacked and the DNS settings have been modified to serve hacked contents to a cyberthief. This […]

Network Security 4 – How to upgrade your router with the latest firmware or replace it completely

It’s difficult to accept that we made an unwise purchase or even that a piece of technology has gone obsolete. But when it comes to the security of your home network, it’s time to face up to it. Last February, Craig Young, a researcher at security firm Tripwire, published research showing that 80% of the […]

How to disable access to your router from the Internet

When Avast Home Network Security (HNS) displays the following error: “Your network router is accessible from the Internet” that means that hackers can access your router’s administrative interface.   Although that doesn’t mean imminent threat, the fact that the router is accessible from the Internet is not good. A cybercrook could modify your network settings […]

How to turn on WiFi encryption in your router settings

Eavesdropping is a major concern when we talk about the security of home WiFi networks. People around you, your neighbors in the next apartment, or even your own government, can discover anything flowing through your Internet traffic. Your personal data, like passwords and log in credentials, your credit card numbers, and  your photos and videos, are […]

Avast 2015 new feature: Home Network Security scanning

Nowadays, security is team work: Software and hardware should work together to achieve the most complete protection possible. Complete protection is why the developers at Avast Software decided to include a security feature called Home Network Security (HNS) in the new Avast 2015. HNS is all about scanning your router for vulnerabilities and identifying potential security problems that open the […]

Leave your credit cards at home; Apple Pay lets you buy things with your phone

In the wake of the Target, and now Home Depot, security breaches, Apple Pay wants to provide a safer way to make a purchase. Nestled in-between this week’s announcements of the iPhone 6 and the Apple Watch, Apple CEO Tim Cook announced a new mobile payment system called Apple Pay. New iPhone and Apple Watch […]

Declaring machine war against malicious Android packages

Do you know the notion “machine war”? If you’re a fan of the Matrix movie trilogy then probably, yes. It denotes the fictional rise of artificially intelligent machines against the human race and their violent conquest of human beings. We want to apply a similar dominance of computationally powerful machines, not to create a population […]