Blog

Top 50 best shooters Games history

Top 50 best shooters in gaming history

Choosing the best shooters we’ve put our paws on in our lives is a very difficult task. Over the years of playing, we’ve already played many games that we’ve loved for a variety of reasons. Having to choose only 50 and arrange them in the …

Russian hackers have modified the browsers Chrome and Firefox

Google Chrome and Mozilla Firefox were victims of the Turla

The Russian hacker group has modified the two most popular browsers. All this in order to gain access to TLS encrypted traffic. The Kaspersky team discovered the whole deal and decided to look at it. The Russian Turla group modified Chrome and Firefox browsers to get fingerprints …

Americans are blocking Chinese companies that create face recognition systems

Major Chinese companies blocked by USA

28 Chinese companies and organizations have been included in the American “black list“.Each of the brands deals with the creation and development of face recognition systems. The American administration banned 28 entities from cooperating with US suppliers – the rulers also decided to block the …

How to speed up the web browser?

How to speed up the web browser

Slow operation of the web browser of even the most patient person can lead to frustration. How to quickly and effectively accelerate its operation? How to speed up the web browser? Who among us did not manage to curse viciously, when once again we met a …

A great blunder of Messenger Kids

Messenger Kids

An application for children that boasts its security systems has proved … not completely secure.   Messenger Kids, not available in India, is a Facebook messenger aimed mainly at the youngest. Its characteristic feature was to be security, requiring, among others parent’s acceptance of the child’s …

How to protect yourself from ransomware attacks?

NAS infrastructure is increasingly falling victim to ransomware

Recent attempts at ransomware attacks on NAS devices have not been left unanswered. Taiwanese Asustor urges its clients to take security measures to protect important data and explains how to do it. NAS infrastructure is increasingly falling victim to ransomware attacks. This is understandable – hackers know …

Three basic rules for using the flash drive safely

It is worth using the media carefully, and also secure them

Portable USB sticks are useful in both everyday and professional life. The data stored on them is often valuable and confidential. For the sake of their safety, it is worth using the media wisely and protecting them properly. Research shows that almost half of people who find …

Facebook plans to hide “likes”

The end of likes on Facebook.

We recently reported that Instagram wants to hide the number of likes, sharing this information only to the account owner. Everything indicates that Facebook will also choose to do the same. Upcoming changes on the Instagram portal caused a considerable storm among the so-called “hearts collectors“. No wonder …