No items in your cart
No items in your cart
Information about potential threats to your personal and financial security covering desktops, laptops, and mobile devices.
A particularly serious security bug was discovered in the code that encrypts the name, password and other information we type in web sites. Major sites have announced they fixed the bug, but many smaller sites may still be affected. The security issue exists in hundreds of thousands to millions of locations worldwide, and provides access […]
New update for iOS 7, the operating system of iPhone and iPad, revealed the unprecedented scale of exposed passwords of hundreds of millions of users on wireless networks for more than year and a half! Users of Apple’s devices are used to a relatively high pace of updates, hence sometimes they wait a long time […]
A new App in Google store named ‘Balloon Pop 2’, is seemingly innocent game that is actually recording user’s WhatsApp calls and publishes them on a website called WhatsAppCopy where anyone can put a phone number and watch the full transcript of the conversation. This is not the first time Android malware creators exploit the […]
The Cold War ended, the Berlin Wall fell and no longer nuclear submarines prowl the waters of the oceans waiting to rain down nuclear Armageddon on our planet, or so they tell us. However, a new Cold War is unfolding in real and its consequences can be disastrous. This is a conflict between the rising […]
On October 21st, The Twitter account of ‘Malindo Air’, a Malaysian airline company, was hacked. The burglar displayed a message saying that the airline supposedly is giving away 100 thousand free tickets. Company officials immediately published a denial on that account as well as their Facebook account, however it seemed like the attacker still had […]
It has become almost second nature – Surfing on the Wi-Fi network. However, while connecting to a wireless network can hold hidden risks, more than a third of the users do not take any caution when connecting. It is easy to connect to the network. Alongside cellular networks and broadband Internet communications, usually there is […]
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.