How to setup a screen lock pattern, PIN or password on your Android Device

To provide greater security and limit who accesses your Android , it is possible to set a screen lock on your smartphone or tablet. This means that every time you turn on the device or activate the screen, you will need to unlock the device – which can be done with a …

How do I know if my phone is being hacked or tracked ?

How do I know if my phone is being hacked or tracked

Like PCs, smartphones are also susceptible to being hacked and tracked by malicious people. However, how do I know if my cell phone is being hacked or tracked amid so many more refined scams? Although in some cases the diagnosis is more difficult, it does not …

Procon notifies WhatsApp, OLX and Mercado Livre for being used in scam

Procon notifies WhatsApp, OLX and Mercado Livre for being used in scam

Scam – The  WhatsApp  is one of the most downloaded applications in USA. Fact that arouses great interest from scammers, who are cloning accounts in the app across the country. In January alone, more than 198,000 American were victims of such attacks. And on Wednesday (20),  Procon-SP  notified …

GBWhatsApp: alternative app that adds several features to the messenger is dangerous?

modified version of WhatsApp

GBWhatsApp has been around for a long time. It calls itself a “modified version of WhatsApp offering the latest features”, which sets up a better user experience. But is GBWhatsApp dangerous? For the simple fact of breaking some security rules without the authorization of the WhatsApp team, …

Kaspersky warns of espionage campaign against Android users

Kaspersky warns of espionage campaign against Android users

Espionage Campaign – Kaspersky researchers have detected a sophisticated malicious campaign targeting users of Android devices that can be attributed, with a medium level of security, to the group specializing in advanced persistent threats (APT) called OceanLotus. Entitled PhantomLance, it has been active since at …

How to completely and permanently disable Windows Defender in Windows 10

How to completely and permanently disable Windows Defender in Windows 10

Permanently disable Windows Defender in Windows 10 – Windows Defender is the security solution developed by Microsoft to protect Windows users from malware. This program, which is activated by default at the end of Windows installation, monitors all system files and notifies the user whenever any …

Shortcut virus: How it works and How to remove it from the Computer

Shortcut virus: how it works and how to remove it from the computer

Shortcut virus – When we generally talk about “viruses” we usually generalize referring to all kinds of computer threats, from the original “viruses” as such to the most complex threats such as worms, Trojans, spyware and even ransomware. Each of the threats has its own characteristics and …

Do you keep your passwords in KeePass? This extension will make your life easier

welcome to kee

If we are really concerned about our online security and privacy, it is very important to have a good password manager. This type of software is based on a secure and encrypted database, protected by a master password. Within this database we will be able to save …

How to Hide Your Social Media Profiles on Android

Hide Your Social Media Profiles on Android – Social media is one of the technological advancements of the contemporary world, without it. We can reconnect with old friends or meet new people. We communicate without limits and share some of our most hidden thoughts. But this new type of …

How do you check if your password has been stolen?

How do you check if your password has been stolen?

Check if your password has been stolen – Internet security is no joke. As you protect your home and personal belongings from thieves, so must your digital data from those who try to steal it . In the deep web there are for sale whole lists of real user and password combinations, …

What is a zero-day exploit ? Why are they so dangerous?

What is a zero-day exploit ? Why are they so dangerous?

Zero-day exploit – You want to know what a Zero Day Exploit is and what you can do about it? We explain it to you!   When it comes to security updates and patches for operating systems, there is always talk of zero-day exploits. But what is that …

Facebook: API Bug gave apps access to images from 6.8 million users

A bug in Facebook’s Photo API bug  gave apps more access to images than users had intended – even unpublished images.   Once again, Facebook has to face a serious data breach: A bug in the image processing programming interface (Photo API) for a short …

Android Phone antivirus security applications

Android phone antivirus security applications

Android phone antivirus security applications – Are you looking for a free antivirus application for an Android device? Don’t know how to have better security against viruses? Well, read on for this article and you will find the best antivirus and security applications.   Fortunately, in the …

The Best free antivirus of 2019 List of the Best

The best free antivirus of 2019 list of the best . Today we present the best antivirus programs that protect your computer safely and effectively. In order to safely surf the Internet, we need a good antivirus, to be sure that nothing can harm our computer. Also Read …

Virtual Private Network (VPN) – A beginner’s guide

Virtual Private Network (VPN)

A virtual private network, usually called a VPN, is an advanced technology that allows private and secure internet access by hiding your online business from prying eyes. Think of something like a protected channel that no one can enter to disturb or steal data from you. An …