Tag Archive for: Exclusive

Save over 60% with this exclusive Trend Micro security deal


When it comes picking the best antivirus and online security software, Trend Micro may not be the first name you think of – despite having passed at full marks the latest AV-Test (opens in new tab) checks on both PC and mobile. And, the good news is that you won’t even have to invest the big bucks to enjoy its top-notch protection.

Usually costing $129.95 for a one-year subscription, Trend Micro Premium Security suite now comes with a 53% discount dropping to just $59.95 (opens in new tab) for a full protection of up to 10 devices at once. 

If that would not be enough of a bargain, TechRadar readers have even the chance to lower the price down by a further 10%. How? Simply add the exclusive code techradar10 at the checkout. This breaks down to a total saving of more than $75.

The Premium Security suite is packed with a huge array of security features and tools to secure your devices against almost all the dangers you can face online: from viruses and ransomware to online scams, malicious websites, data leaks and identity theft. 

Keep reading for more details about this tempting offer and a closer look to all the features included with the Trend Micro Premium Security plan.

Exclusive Trend Micro Premium Security deal:

Trend Micro Premium Security features

This security package covers up to 10 devices at the same time with a single subscription – no matter if you are using a Windows, Mac, Android, iOS or Chromebook. Here’s a sample of the features you get with the Trend Micro Premium Security suite:

Laptop security: full protection for your Windows, Mac and Chromebook device against ransomware, viruses, and dangerous websites.

Mobile security: prevent malicious apps, ransomware, unprotected Wi-Fi, and dangerous websites from infecting both your Android and iOS smartphone.

Password Manager: say goodbye to vulnerable passwords and keylogging malware, measuring password strength and keeping these secure.

Anti-scam tool: enhanced protection against internet or email scams, and from fraudulent websites attempting to steal your financial and personal data when shopping and banking online.

A woman listening to music on a smartphone and a man using a laptop

(Image credit: Trend Micro)

(opens in new tab)

Performance optimization: helps you to identify and fix common…

Source…

Exclusive: Evidence shows US’ NSA behind attack on email system of Chinese leading aviation university


cyber attack Photo:VCG

cyber attack Photo:VCG

The email system of a university in Northwest China’s Shaanxi Province – well-known for its aviation, aerospace and navigation studies – was found to have been attacked by the US’ National Security Agency (NSA), the Global Times learned from a source on Monday.

On June 22, Northwestern Polytechnical University announced that hackers from abroad were caught sending phishing emails with Trojan horse programs to teachers and students at the university, attempting to steal their data and personal information. 

A police statement released by the Beilin Public Security Bureau in Xi’an the next day said that the attack attempted to lure teachers and students into clicking links of phishing emails with Trojan horse programs, with themes involving scientific evaluation, thesis defense and information on foreign travel, so as to obtain their email login details.

To probe into the attack, China’s National Computer Virus Emergency Response Center and internet security company 360 jointly formed a technical team to conduct a comprehensive technical analysis of the case. 

By extracting many trojans samples from internet terminals of Northwestern Polytechnical University, under the support of European and South Asian partners, the technical team initially identified that the cyberattack to the university was conducted by the Tailored Access Operations (TAO) (Code S32) under the Data Reconnaissance Bureau (Code S3) of the Information Department (Code S) of US’ NSA.

TAO is the largest and most important part of the intelligence division of the NSA. Founded in 1998, the main responsibility of TAO is to use the internet to secretly access to insider information of its competitors, including secretly invading target countries’ key information infrastructure to steal account codes, break or destroy computer security systems, monitor network traffic, invade privacy and steal sensitive data, and gain access to phone calls, emails, network communications and messages. 

The various departments of TAO are composed of more than 1,000 active military personnel, network hackers, intelligence analysts, academics, computer hardware and software designers, and electronics…

Source…

AMD Ryzen 7 6800U Tested – with ASUS ZenBook S 13 OLED



Exclusive: Five Eyes alliance fabricating evidence, building rumors of China infiltration: source


The Five Eyes Alliance Photo: VCG

The Five Eyes Alliance Photo: VCG

The Five Eyes Alliance is collecting and fabricating evidence that intends to show China is “infiltrating politically into Western countries,” with the aim of tarnishing China’s image in the world, the Global Times learned from a source close to the matter. 

Analysts said this is not the first time that the Five Eyes have conspired to target China and other countries. As an alliance designed for intelligence sharing, it has been conducting covert or overt operations like theft, interference, infiltration, subversion and coercion. The Five Eyes alliance is not so much as an intelligence-sharing group but an anti-China club.

The Global Times learned that intelligence agencies in the Five Eyes willfully interrogate and harass Chinese students and scholars on questionable or no grounds at all. Some even approach Chinese communities and pressure them to become agents for the Eyes. Although the Eyes are not so sharp at telling the truth from falsehood, they are adept at meddling in the internal affairs of China, among other countries in the world.

In Hong Kong, the consulates of these countries have become the headquarters and command of interference and subversion where their consular officials reached out to anti-China forces and separatists to incite violence by providing financial support and training, the source said. 

The alliance has been obsessed with making up cases of China’s “espionage” and “infiltration” merely based on shoddy intelligence. In 2020, Australian spy authorities raided New South Wales state legislator Shaoquett Moselmane’s home for alleged links with China. But the cited political influence in Australia on behalf of China was never proven by evidence. 

In recent years, Five Eyes alliance is also stepping up its efforts to steal and attack other countries in the area of cybersecurity. 

A latest report from Anzer, a cybersecurity information platform, showed that the US military and government cyber agencies have remotely stolen more than 97 billion pieces of global internet data and 124 billion phone records in the last 30 days, which are becoming a major source of intelligence for the US and other “Five Eyes” countries.

The…

Source…