FileHippo News

The latest software and tech news

Top Online Scams to Be Aware of in 2025

The internet is undoubtedly full of great content, hobbies, information, offers, products, and people, but there’s also a darker side to it. We might not realise it, but every day we’re exposed to threats and scams as we navigate the online world. Curiosity and trust can be exploited to lure…

Meet the new features for Avast Free AV and Avast Premium Security

With millions of active users worldwide, Avast stands as a benchmark in cybersecurity. Why? Because of the quality of its solutions, the reach of its tools and because it is a platform in continuous evolution. A platform that today, once again, places our security at the forefront by reinforcing every…

New Android Malware Simulates Shutdown and Mines Your Data
If you have an Android phone and have purchased third-party apps from outside of the more well-known app stores, you may have put your device at risk from an ingenious new malware that makes it look like you’ve shut off your phone, but instead has only simulated the shutdown... Read more
Users Demand Answers From Lenovo For Pre-Installed Malware & Adware
It’s a privacy advocate’s worst nightmare: announcements came out this week that it’s not the government that citizens have to worry about spying on their computer use, it’s the device manufacturer. The Superfish adware/malware, pre-installed intentionally on select computer models in order to follow users’ internet shopping behaviors, may... Read more
Apple Fixes Google Exposed Security Holes In OS X
Apple has just released the latest update for OS X Yosemite (10.10.2). This update marks the second update for the new operating system since its October 2014 release. It is understood that testing for OS X Yosemite 10.10.2 began back in late November. Apple introduced six beta tests to... Read more
Own A Mac? Protect Yourself With ClamXav
If you own a Mac, you’re less likely to have a virus scanner than a Windows user. For many years, Mac users have relied on the fact that Macs just weren’t that widespread, and that meant most malicious attacks were targeted at Windows machines. Times are changing, and  is one... Read more
Kim Dotcom Launches MegaChat, End-To-End Encrypted Messaging Platform
Kim Dotcom might be bankrupt, but that hasn’t stopped him launch the new MegaChat service, an end-to-end encrypted messaging platform to compete with Skype. Going under the ‘Mega’ brand, Dotcom claimed MegaChat would be much safer than Skype due to servers being based outside the U.S., alongside end-to-end encryption... Read more
Obama Wants Increased Cyber Security For Business and Government
President of the United States, Barack Obama, recently requested Congress to pass legislation to increase cybersecurity.  This would be to aid private industry as well as government security.  There have been recent computer breaches that have increased the threat to national security and so Obama has capitalised on this... Read more
Netflix reportedly clamping down on VPNs
Netflix is only available in a few countries, but it still manages to run into licensing issues, due to movie and TV companies not wanting their programs in regions other than the United States. According to Torrent Freak, Netflix is starting to ban virtual-private networks (VPN) and other services that bypass... Read more
Keep Your Passwords Safe with Password Safe
Password Safe allows you to manage your old passwords and to easily and quickly generate, store, organize, retrieve, and use complex new passwords, using password policies that you control. Once stored, your user names and passwords are just a few clicks away. Using Password Safe you can organize your passwords... Read more
Staples: The Latest Major Retailer Hacked
2014 has not been a good year for retailers. Every month it seems, another store is reporting that they’ve been hacked and that a ton of their customer’s personal information could have been leaked out to hackers. Earlier this year it was Target reporting that their POS system had... Read more
FBI Makes Apple Comply to Encryption by Invoking 18th Century Law
The FBI is struggling to win over Apple and Google, now using an 18th century law to beat the tech companies in court and force them to unlock devices. Apple and Google both added encryption to their smartphones, to protect users from surveillance and theft. The smartphones cannot be... Read more
Protect Yourself with MalwareBytes Anti Exploit
Are you ever worried about the security of the software you use? Malwarebytes Anti-Exploit protects you against the security vulnerabilities that could be found in the code  which make up your software programs. Your software contains millions of lines of code, which unfortunately some people want to exploit. Malwarebytes Anti-Exploit... Read more
How to Create a Secure Password
With the phone hacking scandal and this week’s Russian webcam website, the issue of insecure passwords is on everyone’s minds. An astonishing number of people either do not change their password from the original default (often Admin or 1234) or choose something so obvious that their password may as... Read more
Comodo Internet Security Updated
The latest version of Comodo has been released. The guys behind Comodo claim that their firewall is unique in that it passes all known leak tests to ensure the integrity of data entering and exiting your system. Comodo has put firewall through all kinds of sophisticated tests to ensure... Read more
Encrypt your Keystrokes with AntiLogger
AntiLogger is a very powerful and efficient app which can block various attempts by hackers to access your PC. Although the application is very lightweight, it can detect any attempts to modify your computer’s settings and place malicious code in your system. The app can also detect when someone... Read more
Do You Have a Disaster Recovery Plan?
Do you have a disaster recovery plan in place for your data? If not, checkout Macrium Reflect. The application is a complete disaster recovery solution for your home and office. Protect your personal documents, photos, music and emails. Upgrade your hard disk or try new operating systems in the... Read more
How To Secure Your Wireless Network
Do you use a Wireless network in your home? They are great in terms of flexibility, but you do need to protect your network against hackers. Lots of people assume their home router is not at any risk, but that is not correct. Wireless networks use radio waves, which... Read more
Blackphone Making A Secure Tablet
A little over nine months have passed since the joint venture between privacy specialists Silent Circle and the team which brought people the first Firefox OS hardware; Geeksphone, teamed up to announce to the world the ultra secure mobile phone, Blackphone. The Blackphone is apparently the most secure phone on the market today. I say... Read more
ClevX DriveSecurity: Protection for your USB Flash Drives
ClevX DriveSecurity is an antivirus utility that has been specifically designed for use with USB portable drives, which prevents malware from spreading via portable devices. The application is designed to run without any installation on a host computer; ClevX DriveSecurity will operate from the portable drive itself, thereby eliminating malware... Read more