Mac AV ready for OS X 10.11 alias El Capitan

Besides Apple Music, iOS 9, and watchOS 2, this June was an exciting month for Mac developers with Apple’s presentation of OS X El Capitan at its Worldwide Developers Conference.

ElCapitan
Codename: Made in California Named after a vertical rock formation in Yosemite National Park, the latest version of operating system suggests that…
Read More

Gamescom is coming. Are you ready?

You might know us as the guys and girls making that awesome antivirus, but deep down inside most of us are geeks that love a good sci-fi movie, book or a damn good video game. And we are pretty excited about this year’s Gamescom.

gamers gamescom
Starting with the 5th of August up until the 9th, Cologne will be host to the biggest gaming convention in…
Read More

Legit APPS or PUA? Keep your eyes wide open!

Nowadays, our Personal Computers are able to perform a huge amount of tasks as we can find Applications for mostly everything one can imagine. Not to mention, we often have more than one App installed for the same kind of task. When does it become too much?

Seamless pattern with social media and technology icons
Probably most of you (me included), after buying a brand new and shiny computer, can’t wait to install all the…
Read More

Putting the S into HTTPS

Without encryption you could not do online shopping, online banking or even downloads and updates over the internet without running an extreme risk.

Close-up view on white conceptual keyboard - https (blue key)
Did you know that you are already using encryption in your browser without noticing it? The small lock icon in…
Read More

United Airlines Breached

You sure remember the big data breach that targeted the U.S. Office of Personnel Management, right? Well, the same group apparently attacked United Airlines.

united_airlines
The attack didn’t just happen yesterday though, but around the same time the US government was broken into. According to…
Read More

MD5: The broken algorithm

When you have to work with thousands of files per day, it is generally a good idea to generate a hash of a file that would identify it on a unique way. A hash function is any function that can be used to map digital data of arbitrary size to digital data of fixed size.

MD5 Broken Algorithm
There are many hashing algorithms to choose from. Here are the main factors to take into consideration when deciding which one…
Read More
1 2 3 24