Beware of hackers during holiday season!

More and more internet users are online shoppers, especially during the holiday season. This is a a great opportunity for cybercriminals who are always looking for ways to scam Internet users and smartphone users. Below are some of the tricks used by hackers. No Christmas break for cybercriminals! Indeed, they specifically use this time to

Read More...

The French “Big brother” law has been passed

The military program law (LPM) has just been officially published on December 19th after being accepted by the Senate. This limits actions from the opponents to the law, including MPs who challenge one of this law articles that provides broader access to internet data by the public authorities. “This article raised much concerns among the

Read More...

NSA would also monitor online games

According to a new document released by Edward Snowden, the former NSA agent, and published on ProPublica website, online games such as World of Warcraft and Second Life are being monitored, since 2008, by American and British intelligence agencies. Indeed, according to the document, terrorist and criminal organizations would be using online games to communicate

Read More...

How to avoid appearing in Google ads

Google policy change now allows this Web giant to use your name, profile picture and comments within its advertisements. Indeed, since November 11th, Google can use your activities – e.g. when you write a review or assign a +1 via Google+ – and use them for its own ads. So, if you give a +1

Read More...

NSA also monitors millions of mobile phones

Another NSA scandal is spreading, as some new revelations show that the NSA can keep track of millions of people around the world, by locating their mobile phone. A real Big Brother and omniscient super- power… Since June 2013, when the first revelations were made by the former NSA consultant Edward Snowden, who is now

Read More...

A new malware to target your files

A new malware is ramping in Switzerland. It targets the word or excel documents and encrypts them before cybercriminals request for a ransom to make them usable again. Hackers use this new ransomware to abuse internet users. They send a program to deal with files from your computer, then they blackmail the victim, requesting for

Read More...

Towards the end of using Internet passwords?

Passwords play a crucial role in helping us to protect our privacy, but … are they as secure as they should be? And are there other ways for reinforced security ? In our society, based on property, privacy and confidentiality , it is crucial to be able to identify oneself safely . The key you

Read More...

PirateBrowser announced to have reached 1 million downloads

For its 10th anniversary, The Pirate Bay, torrent most contested p2p site offered a new web browser meant to bypass censorship in some countries. The download PirateBrowser page refers to countries such as Iran, the United Kingdom, Belgium and Italy. The tool is based on Tor, Firefox Portable Edition and Foxy Proxy is used to

Read More...

California passed a law to erase one’s digital past

In California, a new law will enable teenagers to remove embarrassing photos or comments they have posted from their personal pages on social networks. California really wants to save the reputation of its e- teens with this called “the gum law” that has been enacted by the Governor of California and will come into force

Read More...

Behind the scenes of Cybercrime business

A recent study shows that cybercrime business today has become quite an organised field, with executives, managers and workers who depend on a variety of service providers to keep the illegal operations running. The 2013 Cybercrime Report from Fortinet explains on such arena of criminal organisations either competing with each other to find and hire

Read More...