No items in your cart
No items in your cart
Information about potential threats to your personal and financial security covering desktops, laptops, and mobile devices.
On October 21st, The Twitter account of ‘Malindo Air’, a Malaysian airline company, was hacked. The burglar displayed a message saying that the airline supposedly is giving away 100 thousand free tickets. Company officials immediately published a denial on that account as well as their Facebook account, however it seemed like the attacker still had […]
Apple’s new iPhone 5s device keeps on being tested all over the place. Only few days after discovering a loophole in its lock-screen, a new bypass was found. One of the most interesting features introduced in the new iPhone is the biometric lock mechanism, which the company called – ‘Touch ID’. This is a mechanism […]
Jose Rodriguez, a 36 years old soldier who lives in Spain was first to reveal the gap. A video showing how easy it is to bypass the lock screen in Apple’s new devices running iOS 7 and to penetrate it in less than a minute using only a few clicks Shortly after the official launch […]
What is common between Lily Collins, Britney Spears, Sandra Bullock, Adriana Lima, Katy Perry and Jon Hamm? Give up? I’ll give you a hint: All are more dangerous than you think. Those are the top ten searched celebrities on the web that if you look for various details about them, especially the kind of revealing […]
“I am a single American soldier, would you send me money?” – this is how a mother and daughter convinced hundreds of victims to send them money as part of a huge ‘Nigerian Scam’ style fraud. The Nigerian Scam is one of the more common types of financial frauds. This scam is usually carried out […]
Since the last blogs posted about multiple social networks frauds, I’ve been getting multiple questions so I’ve decided to publish the common fraud attack methods and how to recognize and avoid them. The social networks are very fertile ground for cybercriminals, and sometimes it is difficult to distinguish between true stories and those who spread […]
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.