Microsoft is taking aim at traditional single password systems with the upcoming version of Windows, by including build in two-factor authentication according...
Windows 10 Technical Preview (TP), a trial version released last week, collects and transmits lots of user data to Microsoft, according to...
Threat actors have taken note of the large number of UEFI vulnerabilities that have been found in recent years, as well as...
An unpatched design flaw in the implementation of Microsoft Exchange’s Autodiscover protocol has resulted in the leak of approximately 100,000 login names...
Windows licenses are usually expensive. For example, for an original license of Microsoft’s “Windows 10 Pro” in the official Microsoft store 199.99$...
The job of a good system information software is to tell you every detail about your PC’s hardware and software. Some of...
The deepin Linux distro has a long history of different names, including Deepin, Linux Deepin, etc. This China-based distro is also known for...
The flaw is being exploited by at least two malicious actors; Users are encouraged to install updates as soon as they are....
People who have spent a lot of money to curate their music collection are always in search of a best and free...
Google Chrome is already known for slowing down computers, ultimately leading to 100% disk usage. On top of that, we now have...
A ransomware that encrypts personal files and then demands 110 yuan (~$16) in ransom has affected over 100,000 Windows PC in China. The...
CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project. Currently, the project manager is Nanni Bassetti...
A dangerous malicious campaign SmokeLoader Malware abusing MS office document that spreading via spam Email and targetting windows 8 and above users....
As our basic PDF reading needs are fulfilled by web browsers, the need for a free PDF reader software is decreasing. Still,...
Did script kiddies use DoublePulsar code released by NSA-leaking Shadow Brokers? Security experts believe that tens of thousands of Windows computers may...
NMAP : Nmap is a free tool for network discovery and security auditing. It can be used for host discover, open ports,...
Short Bytes: Windows 8 and later versions of Windows come with UEFI Firmware settings which allow a user to disable any external...
Short Bytes: Registry Cleaners are the software which does the job of removing outdated registry entries from Windows registry. These registry entries...
After messing around with users’ webcams the Microsoft’s Windows10 Anniversary Update is now causing crash whenever an Amazon Kindle is connected through USB. Microsoft...
Short Bytes: Password cracking is an integral part of digital forensics and pentesting. Keeping that in mind, we have prepared a list...
Short Bytes: The security firm Avecto has just released its security report on Windows operating system. The report outlines an important result...