Top 4 photo editing apps for instagram

Most people spend a lot of time from their day “stalking” photos and videos. All the “game” is played there now. If you want to impress with your “photos” and your modern “feed”, I have the solution! As you already know, in instagram you publish photos and the secret to Διαβάστε Περισσότερα …

Attention: Those who have these Windows are in danger of hacking!

Google discovered a serious vulnerability in Windows 7 operating system and warned users of the system (which are still many around the world) that their computer is in danger of breached by hackers . Microsoft , which was informed, said that working to tackle the problem. The hackers exploit the “hole” in Windows 7, in conjunction with a separate error Διαβάστε Περισσότερα …

Fake bank apps target Android users

Android users have underestimated the danger from fake banking apps, warn researchers of ESET, and ought to be more careful about this type of malware targeting mobile banking.‎ These apps mimic authentic bank applications to extract user access data into their bank accounts or even steal money. Although not considered Διαβάστε Περισσότερα …

Malware warning on Google Play

ESET’s researchers discovered the first Android malware that can replace the contents of the clipboard of a device in GooglePlay. The so-called “clipper” targets Bitcoin and Ethereum encryption transactions, aiming to redirect the transfer of funds to the attacker’s wallet instead of the victim. “This discovery shows that clippers, which can redirect amounts of encryption, are no longer found in Διαβάστε Περισσότερα …

Apple: Disables Group FaceTime to fix a serious problem

A bug that lets you hear people who you have invited to a group conversation before these people accept the call is the reason Apple is going to disable Group FaceTime. Disabling FaceTime ‘s group chat was on Monday as the US company tried to resolve the problem, with the solution expected to come by the end of the week. Διαβάστε Περισσότερα …

Millions of email passwords leaked – Check if yours is in the list!

Internet users are in panic, after news that more than 773 million files containing emails and passwords have leaked to the Internet. “Massive password leakage containing 773 million details – Learn if it affects you” is titled Mirror’s report revealing the news. Leakage of these data revealed by Troy Hunt, Διαβάστε Περισσότερα …

A Trojan detected that steals money from PayPal accounts

ESET researchers have discovered a new “Android Trojan” targeting the official “PayPal” application while being able to bypass the two-factors “PayPal” certification test. The “Trojan”, first detected by ESET in November 2018, combines the capabilities of a remote-controlled “banking Trojan” with a new form of abuse of “Android’s” accessibility features, Διαβάστε Περισσότερα …

Fake fitness application on iOS steals money

Fake application on “iOS” promises physical monitoring, but actually steals money, warns ESET. ESET warns users of “iOS devices” to be careful as many applications have been identified, supposedly helping to track the physical state, while actually using Apple’s “Touch ID” to steal money. Among the many applications that help users in a healthier Διαβάστε Περισσότερα …

How to delete your profile on Facebook

#DeleteFacebook. The hashtag that some time ago had become viral, is now a reality. After the scandal of Facebook, where it was revealed that users’ data had been leaked in “Cambridge Analytica”, many people were alarmed and outraged by the platform. Since then, until now, exactly what has been said by the most famous, hashtag: users delete the application. Prior Διαβάστε Περισσότερα …

Cyberattacks: Latest Computer Virus In 2018

There have been many cyber-attacks in the past decade. With use of latest techniques and coding, hacking and cyber-threats have become much easy and common. The only thing with the evolution of cyber-attacks is that they have become more dangerous and threatening like never. They can take out any bit Διαβάστε Περισσότερα …

Brain-hacking: Technology exists and… is vulnerable (video)

In the future, cyberattacks may be able to exploit the memory implants to steal, to watch, to change or control the human memories. And while we are several decades of the most radical threats, the necessary technology is already in the form of deep brain stimulation devices, and as follows… vulnerable. (See relevant video below) Scientists learn how Διαβάστε Περισσότερα …

Universities targeted by phishing attacks

Kaspersky Lab draws the attention of academics during their online tours as numerous digital attacks have been detected in at least 131 universities in over 16 countries. These attempts to intercept sensitive academic information have been intensified over the last 12 months; more than 1,000 phishing attacks have been recorded Διαβάστε Περισσότερα …

This will make your profile on Facebook really private

Facebook is an amazing tool to keep in contact with relatives, friends and acquaintances. But the facilities offered to come with a price: your personal moments and information. That’s why there are ways to make your profile more private if you’re tired of all this extroversion. Of course, always runs the risk Διαβάστε Περισσότερα …

Hackers use the popular messenger logo for targeted attacks

A wave of targeted digital espionage attacks in a Central Asian diplomatic organization, with the  “Octopus” trojan that uses the form of a famous and legitimate online messenger, discovered researchers from “Kaspersky Lab“. Once “Octopus” is installed, it provides attackers with remote access to the victims’ computers. Threatening operators are constantly looking for exploitable modern trends and adapting their methods Διαβάστε Περισσότερα …

What are the best times to post on Facebook, Instagram and Twitter

Not all hours and days are the most appropriate to successfully promote your announcements and to pass your message. Dimitris Stragalas, Head of Social Media of “Cloudevo” , the fastest-developing company “digital growth” in Greece gives us the answers through the following guide. “Depending on the channel, there are specific times and days when our content can gather Διαβάστε Περισσότερα …