Information about potential threats to your personal and financial security covering desktops, laptops, and mobile devices.
It has become almost second nature – Surfing on the Wi-Fi network. However, while connecting to a wireless network can hold hidden risks, more than a third of the users do not take any caution when connecting. It is easy to connect to the network. Alongside cellular networks and broadband Internet communications, usually there is […]
Apple’s new iPhone 5s device keeps on being tested all over the place. Only few days after discovering a loophole in its lock-screen, a new bypass was found. One of the most interesting features introduced in the new iPhone is the biometric lock mechanism, which the company called – ‘Touch ID’. This is a mechanism […]
Jose Rodriguez, a 36 years old soldier who lives in Spain was first to reveal the gap. A video showing how easy it is to bypass the lock screen in Apple’s new devices running iOS 7 and to penetrate it in less than a minute using only a few clicks Shortly after the official launch […]
What is common between Lily Collins, Britney Spears, Sandra Bullock, Adriana Lima, Katy Perry and Jon Hamm? Give up? I’ll give you a hint: All are more dangerous than you think. Those are the top ten searched celebrities on the web that if you look for various details about them, especially the kind of revealing […]
“I am a single American soldier, would you send me money?” – this is how a mother and daughter convinced hundreds of victims to send them money as part of a huge ‘Nigerian Scam’ style fraud. The Nigerian Scam is one of the more common types of financial frauds. This scam is usually carried out […]
Since the last blogs posted about multiple social networks frauds, I’ve been getting multiple questions so I’ve decided to publish the common fraud attack methods and how to recognize and avoid them. The social networks are very fertile ground for cybercriminals, and sometimes it is difficult to distinguish between true stories and those who spread […]
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.