Deutsch (German)Dansk (Danish)Norsk bokmål (Norwegian Bokmål)Svenska (Swedish)
English
  • Terms and Conditions
  • EULA
  • Affiliate
  • Anti Explorators Security Blog
  • My Account
Anti Explorator
0
Product was successfully added to your cart
  • Free Trial
  • About Anti Explorator
  • Security Encyclopedia
  • Support 24/7
  • BUY IT
Your browser does not support the video tag.

Anti Explorators Security Blog

How do I keep my computer safe from malware

How do I keep my computer safe from malware?

May 24, 2020admin

Advertorial When the hardware on our computers starts to behave abnormally, it’s no wonder that you start to think that it’s a virus that ravages. While this is a possibility, the problem is usually a specific virus called malware. What preventative measures can you take to keep malware such as ransomware, phishing and cryptojacking away? Read our tips below to keep you and your computer safe!  Be careful about the websites you visit and software you download… Websites can be insidious. They can be filled with malaware and suspicious content. If a download that you don’t approve of starts, immediately cancel it and leave the webpage. Some websites may be more vulnerable to malware than others, so it’s important to keep track of which ones that are safe, and which ones that are not. One market that has been exposed for such in recent years is the cryptocurrencies and the…

Read More
index

Smid den virusramte computer i skraldespanden

March 2, 2020admin

Annonce Når vi bevæger os rundt på internettet, findes der utallige fælder, der kan lokke os til at installere et program, der ellers ser helt uskyldigt ud, trykke på et link i en mail eller måske endda sige ja til at udlevere personlige oplysninger til folk, der virker troværdige, når vi snakker med dem. Fælder, som vi skal passe på med at hoppe i. Skulle vi alligevel falde i, kan de mange fælder betyde, at vi i løbet af ingen tid kan blive ramt af en virus på vores computer. Der er især fem fremtrædende trusler, som vi rammes af, når vi bevæger os rundt på computeren. En af de største trusler mod vores computer er netop virussen, som også kan kaldes for orme eller trojanske heste. Og er man først blevet ramt af sådan en virus, kan den være svær at komme af med igen. På borger.dk kan du…

Read More
aenyhed32

Beskyt dig selv, din computer og din mobiltelefon

December 10, 2019admin

Annonce Det er vigtigt, at du beskytter dine data og personoplysninger mod diverse trusler på internettet. Hvis hackere får adgang til dine elektroniske enheder, kan du opleve at dine oplysninger kommer i de forkerte hænder, og det kan resultere i mange ubehagelige situationer. Vær derfor opmærksom på, hvilke af dine oplysninger der er særligt sårbare. Lær mere om, hvad personoplysninger er hos Datatilsynet. Bloker skadelige programmer med et antivirusprogram Når du surfer på internettet, kan du nemt komme til at downloade en fil eller et program, som ikke er sikkert. Det kan nemlig være svært at gennemskue, hvad der er en troværdig kilde, og hvad er ikke er. Derfor er det vigtigt, at du beskytter dine enheder i din husstand mod skadelige angreb. Programmet som du vælger at installere på samtlige elektroniske enheder, bør som minimum indeholde antivirus, antispyware, spamfiltrering, antiphishing og firewall. Læs mere om, hvordan du undgår at…

Read More
anti-explorator.com - undgå virus

Undgå virus

September 13, 2019admin

Annonce Virus. Det er det ord vi alle frygter når vi snakker om teknologi og computere. Det er ikke uden grund, for enhver slags virus kan langsomt nedbryde vores computer og gøre således at den til sidst står helt af. Det er dog ikke helt ualmindeligt at få virusser i dag, hvor clickbaits og svindlere dagligt popper op i mailens indbakke. Det er ikke altid tydeligt, hvilke links man ikke må følge, men alligevel er der nogle retningslinjer der er gode til at undgå virus. Giv utrygge sider opmærksomhed Når du surfer rundt på internettet, vil nogle sider oftest være mere hyppige, eller gængse end andre. Offentlige sider, som mange brugere, hver dag besøger, er ofte velkendte og trygge, men nogle gange ender man på sider, hvor virusser er en del af oplevelsen. Den helt store virus-opstøver findes i pornografiens verden, hvor siderne og videoerne oftest medfører en virus. Til…

Read More
aenyhed2009

Your intelligent car can be hacked

September 20, 2017Kenneth Jørgensen

Although the car industry and security companies have been aware of the risk of car hacking for years, it is still complicated to protect cars from digital burglary. A group of researchers and employees at a security company has discovered a weakness in the car’s internal network. The vulnerability lies in a protocol that is essential to the car’s functions. This weakness can be used to hack the car and has so far been overlooked by the car industry.   Cars can be hacked through their internal communication system On August 16 the security company Trend Micro published a blog post highlighting this security risk. They have discovered vulnerability in collaboration with researchers from LinkLayer Labs and Milan Polytechnic University. The discovery is not a small or basic fault in the car’s software. There is an error in the CAN protocol that enables the car’s components to communicate and send…

Read More
How do I keep my computer safe from malware

Sci Fi hack: Bio-hackers encode DNA string with malicious code

September 4, 2017Kenneth Jørgensen

In August 2017 a research group from the University of Washington released spectacular results: They have found that malware can be encrypted into physical DNA threads. Their aim was to test open source software for security holes, the type of bioinformatics software that researchers worldwide use to analyze DNA material. Where you would normally check the security of computer software by using common malware the research group decided to attack the computer that should analyze the results with DNA strings containing malicious code. For the sake of the experiment, the researchers purposefully implemented a security hole in the system, but they emphasized that similar security holes do exist in the DNA software used today.   DNA-computation Normally computers operate by using silicon-based technologies. DNA computing is a form of computing where DNA, biochemistry and elements of molecular biology are used as hardware instead. With DNA computation the process speed is…

Read More
seal-42280_960_720

The hacker who stopped WannaCry arrested by the FBI

September 4, 2017Kenneth Jørgensen

Just three months after 23-year-old Marcus Hutchins and his colleagues stopped the dreaded ransomware WannaCry he has been arrested on his way home from Defcon, the world’s largest hacker conference. At the conference participants work with different kinds of hacks, malware and spyware. Security people and researchers from all over the world participate. Including Danish researcher Carsten Schürmann who demonstrated how to quickly and easily he could hack into American voting machines. Where Schürmann was celebrated for his work at Defcon things didn’t turn out as well for Hutchins. You can read more about this hack here on our blog.   From WannaCry hero to prison When Hutchins became aware of WannaCry and analyzed the threat he found out that it was associated with a non-existent domain. Therefore Hutchins registered a domain and the malware stopped spreading immediately. The fast work and effort quickly made him a hero in security…

Read More
hackusa

Professor hacks American voting machines

September 4, 2017Kenneth Jørgensen

In July, computer scientist Carsten Schürmann from the IT University in Copenhagen went to Las Vegas to attend Defcon which is one of the world’s largest hacking conferences. At the conference Schürmann participated in a workshop on hacking voting machines. More specifically the American voting machines that were used for, among other things, several elections in 2004-2015. The machines are Windows based and the hack was successful due to an old error in Windows XP. The security flaw could have potentially allowed hackers to change election results and thus affect who would become senators, governors and US president. The machines are called WinVote machines, voters cast their votes electronically and anonymously making it difficult to trace the hack. Microsoft Corporation has refused to comment on the incident.   Easy hack that can’t be tracked Schürmann used a classical method to hack the WinVote machine. First he connected his computer wirelessly…

Read More
mobile-phone-1917737__340

Lithuanian cyber criminal fools Facebook to pay 100 million US dollars

September 4, 2017Kenneth Jørgensen

The Lithuanian businessman Evaldas Rimasauskas has been extradited to the United States under charges of tricking Facebook and Google to pay him over $100 million. He was arrested in Lithuania, extradited to the United States and has been denied bail. Rimasauskas owns a small construction company who fooled the two big companies to send him money by pretending he was an Asian hardware manufacturer.   Facebook pays 100 million US dollars The US prosecutors have not mentioned the specific companies in the prosecution. The companies were later mentioned in a Lithuanian legal document declaring that Facebook was fooled into transferring almost 100 million dollars to bank accounts which Rimasauskas controlled. In 2013-2015 Google sent $23 million in his direction. Both companies have explained that they have got the lost money back after discovering the fraud. Rimasauskas’s lawyer John H. Kim has stated that he did it solely to make large…

Read More
cinema-strip-64074__340

Hackers demand 6 million dollars from HBO

August 27, 2017Kenneth Jørgensen

On August 8th 2017 the hacker group called of Mr. Smith, declared that HBO had three days to pay them 6 million dollars. It has taken the hackers six months to access the 1.5 Tb data which they claim to have stolen from HBO. They believe that 6 million dollars equals half a year’s salary. The hacker group want the money paid in bitcoins because they can be used outside of the normal banking systems. If they do not get the money they will publish all episodes of Game of Thrones – including episodes that have not yet been released. In addition they threaten to publish manuscript material from season 4-7.   Mr. Smith steals 1.5 Tb of data The hackers have already released about half a Gb of material, including episodes of the series Ballers and Room 104 online. In addition to the film and series they have gained…

Read More

Posts navigation

1 2 … 6 >
© 2015 - All rights reserved. Anti-Explorator
Facebook