No items in your cart
No items in your cart
Information about potential threats to your personal and financial security covering desktops, laptops, and mobile devices.
So what’s the problem exactly? Samsung’s software, designed to protect against thieves by allowing those who own a smartphone to remotely lock the device, see where it’s located and even make it ring even if it’s in silent mode. Due to a security failure, which does not verify the source of commands sent to […]
Between remote connection from home, which blurs the distinction between personal and business information, to the increasing ability of hackers to break complex systems, what are the current five major trends in cyber-security? The cyber-security field is one of the hottest areas today because almost every one of us reveals much information on unusually large […]
The first ransomware running on Android devices that encrypts files has been discovered – in contrast to earlier discoveries of heretic software also on the Android platform, which prevents access to files but does not encrypt them. During the last several year, the infamous CryptLocker, which runs on Windows Operating System, has been a prolific […]
A particularly serious security bug was discovered in the code that encrypts the name, password and other information we type in web sites. Major sites have announced they fixed the bug, but many smaller sites may still be affected. The security issue exists in hundreds of thousands to millions of locations worldwide, and provides access […]
New update for iOS 7, the operating system of iPhone and iPad, revealed the unprecedented scale of exposed passwords of hundreds of millions of users on wireless networks for more than year and a half! Users of Apple’s devices are used to a relatively high pace of updates, hence sometimes they wait a long time […]
A new App in Google store named ‘Balloon Pop 2’, is seemingly innocent game that is actually recording user’s WhatsApp calls and publishes them on a website called WhatsAppCopy where anyone can put a phone number and watch the full transcript of the conversation. This is not the first time Android malware creators exploit the […]
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.