Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

Security & Privacy

Information about potential threats to your personal and financial security covering desktops, laptops, and mobile devices.


More than a third of the users do not bother with Wi-Fi protection

It has become almost second nature – Surfing on the Wi-Fi network. However, while connecting to a wireless network can hold hidden risks, more than a third of the users do not take any caution when connecting. It is easy to connect to the network. Alongside cellular networks and broadband Internet communications, usually there is […]

Oops: iPhone 5s biometric ID has been compromised

Apple’s new iPhone 5s device keeps on being tested all over the place. Only few days after discovering a loophole in its lock-screen, a new bypass was found. One of the most interesting features introduced in the new iPhone is the biometric lock mechanism, which the company called – ‘Touch ID’. This is a mechanism […]

Bypass iOS 7 lock-screen in less than a minute.

Jose Rodriguez, a 36 years old soldier who lives in Spain was first to reveal the gap. A video showing how easy it is to bypass the lock screen in Apple’s new devices running iOS 7 and to penetrate it in less than a minute using only a few clicks Shortly after the official launch […]

This girl could get you in trouble

What is common between Lily Collins, Britney Spears, Sandra Bullock, Adriana Lima, Katy Perry and Jon Hamm? Give up? I’ll give you a hint: All are more dangerous than you think. Those are the top ten searched celebrities on the web that if you look for various details about them, especially the kind of revealing […]

Nigerian Scam: The next generation

“I am a single American soldier, would you send me money?” – this is how a mother and daughter convinced hundreds of victims to send them money as part of a huge ‘Nigerian Scam’ style fraud. The Nigerian Scam is one of the more common types of financial frauds. This scam is usually carried out […]

The elderly and children are often victimized by cybercriminals.

How to avoid common social network frauds

Since the last blogs posted about multiple social networks frauds, I’ve been getting multiple questions so I’ve decided to publish the common fraud attack methods and how to recognize and avoid them. The social networks are very fertile ground for cybercriminals, and sometimes it is difficult to distinguish between true stories and those who spread […]