• 19 August 2014
    Adware may seem annoying at best when all it does is create pop-up and pop-under ads on your screen. But some adware have hidden capabilities that deliver more harmful malware behind the scenes.
  • 14 August 2014
    Targeted attacks are designed to circumvent existing policies and solutions within the target network, making detection a challenge. To do this, IT administrators need to know what to look for, and where to check for signs of compromise.
  • 14 August 2014
    Scrutinize that Google Drive or Dropbox link before clicking. Spam could be used to distribute backdoors; in this case, the message includes a link that points to a Google Drive URL.
  • 13 August 2014
    Arbitrary code execution - this is the end-result if your Internet Explorer and Windows Media Center are not updated with the August security patches from Microsoft.
  • 12 August 2014
    Think all apps in your smartphone and tablet are secure? Our analysis on the FakeID vulnerability might change the way you use your apps.
  • 12 August 2014
    Security issues such as the Heartbleed bug and a number of huge data breaches were the main attractions of the second quarter of 2014. Targeted industries and security companies responded in varying fashion, all in the name of protecting end-users.
  • 11 August 2014
    Cybercrime using targeted attack methods, botnets, and web defacement - these are some of the threats that have evolved and are thriving in Africa. What used to be the originators of the 419 Nigerian scam have embraced and allowed new threats.
  • 07 August 2014
    live casino online research found that the attackers who compromised Gizmodo Brazil used vulnerable WordPress plugins in the attack. WordPress users are advised to enforce strong passwords and study theme codes carefully before deploying them.
  • 06 August 2014
    Thinking and recalling strong passwords can be a challenge, especially for multiple accounts. If you don't want to trust your security to a password manager, here are a number of ways you can create strong passwords that you can remember.