FileHippo News

The latest software and tech news

A Shattered Collection of My Best Memories: An Immediate Solution Thanks to Stellar Photo Recovery

Who doesn’t love creating new memories and saving them as photos on a smartphone, PC, or any other digital media? While many of us share some on social media, we keep the most precious and private ones to ourselves. Sadly, my hard drive of photos became corrupted, which held images…

Obama Wants Increased Cyber Security For Business and Government
President of the United States, Barack Obama, recently requested Congress to pass legislation to increase cybersecurity.  This would be to aid private industry as well as government security.  There have been recent computer breaches that have increased the threat to national security and so Obama has capitalised on this... Read more
Netflix reportedly clamping down on VPNs
Netflix is only available in a few countries, but it still manages to run into licensing issues, due to movie and TV companies not wanting their programs in regions other than the United States. According to Torrent Freak, Netflix is starting to ban virtual-private networks (VPN) and other services that bypass... Read more
Keep Your Passwords Safe with Password Safe
Password Safe allows you to manage your old passwords and to easily and quickly generate, store, organize, retrieve, and use complex new passwords, using password policies that you control. Once stored, your user names and passwords are just a few clicks away. Using Password Safe you can organize your passwords... Read more
Staples: The Latest Major Retailer Hacked
2014 has not been a good year for retailers. Every month it seems, another store is reporting that they’ve been hacked and that a ton of their customer’s personal information could have been leaked out to hackers. Earlier this year it was Target reporting that their POS system had... Read more
FBI Makes Apple Comply to Encryption by Invoking 18th Century Law
The FBI is struggling to win over Apple and Google, now using an 18th century law to beat the tech companies in court and force them to unlock devices. Apple and Google both added encryption to their smartphones, to protect users from surveillance and theft. The smartphones cannot be... Read more
Protect Yourself with MalwareBytes Anti Exploit
Are you ever worried about the security of the software you use? Malwarebytes Anti-Exploit protects you against the security vulnerabilities that could be found in the code  which make up your software programs. Your software contains millions of lines of code, which unfortunately some people want to exploit. Malwarebytes Anti-Exploit... Read more
How to Create a Secure Password
With the phone hacking scandal and this week’s Russian webcam website, the issue of insecure passwords is on everyone’s minds. An astonishing number of people either do not change their password from the original default (often Admin or 1234) or choose something so obvious that their password may as... Read more
Comodo Internet Security Updated
The latest version of Comodo has been released. The guys behind Comodo claim that their firewall is unique in that it passes all known leak tests to ensure the integrity of data entering and exiting your system. Comodo has put firewall through all kinds of sophisticated tests to ensure... Read more
Encrypt your Keystrokes with AntiLogger
AntiLogger is a very powerful and efficient app which can block various attempts by hackers to access your PC. Although the application is very lightweight, it can detect any attempts to modify your computer’s settings and place malicious code in your system. The app can also detect when someone... Read more
Do You Have a Disaster Recovery Plan?
Do you have a disaster recovery plan in place for your data? If not, checkout Macrium Reflect. The application is a complete disaster recovery solution for your home and office. Protect your personal documents, photos, music and emails. Upgrade your hard disk or try new operating systems in the... Read more
How To Secure Your Wireless Network
Do you use a Wireless network in your home? They are great in terms of flexibility, but you do need to protect your network against hackers. Lots of people assume their home router is not at any risk, but that is not correct. Wireless networks use radio waves, which... Read more
Blackphone Making A Secure Tablet
A little over nine months have passed since the joint venture between privacy specialists Silent Circle and the team which brought people the first Firefox OS hardware; Geeksphone, teamed up to announce to the world the ultra secure mobile phone, Blackphone. The Blackphone is apparently the most secure phone on the market today. I say... Read more
ClevX DriveSecurity: Protection for your USB Flash Drives
ClevX DriveSecurity is an antivirus utility that has been specifically designed for use with USB portable drives, which prevents malware from spreading via portable devices. The application is designed to run without any installation on a host computer; ClevX DriveSecurity will operate from the portable drive itself, thereby eliminating malware... Read more
Concerned Over Password Security? Download KeePass
Are you concerned over your passwords?  If so, don’t worry as there are many free password managers that are available, one such application is KeePass.  It is a free open source password manager that helps you to manage your passwords in a secure manner. Your passwords are secured in one... Read more
Worried About Security? Download AVG Free Edition
Security is on everyone’s lips these days and with good reason.  The amount of viruses and malware is an ever-increasing threat.  There are many applications that are available on the market, some at cost and some at no cost. But with so many to choose from, which application do... Read more
Is Your Keyboard Secure? Check out Antilogger
AntiLogger is an extremely powerful and efficient application that can block numerous attempts by hackers to access your computer. Although the application is very lightweight, it can detect any attempts to modify your computer’s settings and place malicious code onto your system. The crowning jewel in the application’s arsenal... Read more
Strong Passwords: How To Make Them
It is commonplace to see the phrase “Be sure to use a strong password.”  In fact, if you have any dealings whatsoever online, then you will constantly see it.  Why should you have a strong password? Well, for one thing if you don’t and your data is easily accessed,... Read more
Nude Photos Of Celebs Stolen From iCloud – is “Find My iPhone” To Blame?
Apple has some major explaining to do after it emerged that nude photos of A-list celebrities were published on 4chan, the anonymous image-sharing site. A total of 101 celebrities were targeted by the hacker who allegedly broke into their iCloud accounts and stole the images. One such celebrity was... Read more