Search

Terra Privacy Blog

Viruses vs. Trojans

Which are more common: viruses or trojans?  The answer might surprise you.

Continue reading “Viruses vs. Trojans”

Burlington Electric Malware vs. Hacker Deterrent

Would Hacker Deterrent have blocked the malware recently found on a Burlington Electric laptop?

Continue reading “Burlington Electric Malware vs. Hacker Deterrent”

Hacker Deterrent 2.1 Beta

Hacker Deterrent 2.1 Beta is available now for Windows 7 & 8.  The Windows 10 beta version will be available January 15.  This release offers seven new powerful features:

Continue reading “Hacker Deterrent 2.1 Beta”

Hacker Deterrent: Version 2.0

We are pleased to announce the launch of Hacker Deterrent 2.0.

Continue reading “Hacker Deterrent: Version 2.0”

#1 Hacking Method of 2016

The Verizon Data Breach Report for 2016 is out.  So what was the number one hacking method of 2016?  And how can you protect yourself from it?

Continue reading “#1 Hacking Method of 2016”

Email Security & Privacy

Two recent Yahoo incidents raise serious concerns over email security and privacy:

  • Over 500 million Yahoo email accounts were recently hacked. (NBC News)
  • The US Govt installed a “” backdoor into Yahoo email servers. (The Intercept)

According to a recent Pew Research survey, most Americans (69%) don’t trust their government to be able to keep their personal information safe and secure.  The concern of the majority has already come to pass:

“The program that was installed for interception was very carelessly implemented, in a way that if someone like an outside hacker got control of it, they could have basically read everyone’s Yahoo mail” — “Ex-Yahoo Employee: Government Spy Program Could Have Given a Hacker Access to All Email” (The Intercept)

With the major email providers offering little security and even less privacy, what can you do to take email security and privacy back into your own hands?

Continue reading “Email Security & Privacy”

Key To It All

When it comes to defeating trojans, there’s one key to it all: Command and Control Centers (aka C & C Centers, or C2 Centers).  C2 Centers are the very heart of the hacker’s operation.  Copies of the files you read, the keystrokes you type, the videos you watch, etc. are all packaged and sent to the hacker’s C2 Center.  Also, when a hacker wants to control your computer, such as uploading a file, he does so through the C2 Center as well.

Even though C2 Centers are the very heart of the hacker’s operation, half of the security experts at large companies aren’t familiar with them.  This lack of knowledge results in tragic consequences.  For the golden key to stopping hackers is to sever their malware’s connection to the C2 Center.  The moment you do so, the hacker’s entire operation falls apart.

Continue reading “Key To It All”

Shockingly Easy To Break Windows 10 Encryption

What if the supposedly secure Bitlocker encryption on Windows 10 could be completely undone simply by pressing two keys?  It’s actually that shockingly easy, provided you know which two keys to press and when.

Continue reading “Shockingly Easy To Break Windows 10 Encryption”

New Trojan Records Everything

Trojan T9000 records your video, audio, chats, Microsoft Office files, and more.  Meanwhile, it’s undetectable to traditional anti-malware products, including: Norton, McAfee, Bitdefender, and Kaspersky.

How does T9000 avoid detection by all traditional antivirus and firewalls? What can be done to stop sophisticated trojans like T9000?

If you follow this story from beginning to end, you will discover a very surprising method to finally stop even the most sophisticated trojans once and for all.

Continue reading “New Trojan Records Everything”

Blog at WordPress.com.

Up ↑