• August 27, 2014
    “Windows 9 Free Download!“ sounds too good to be true but cybercriminals still use bait like this to get you to install adware on your computer.
  • August 27, 2014
    Mobile malware continues to rise and vary - ransomware and bitcoin-mining malware emerge. Vulnerabilities in Android abound. Our review of the first half of 2014 reveals these results.
  • August 25, 2014
    live casino online research shows that almost all Netis/Netcore routers have an open port that allows a knowledgeable attacker to exploit your computer and network. It may be time to replace your router.
  • August 21, 2014
    FlashPack exploit kits that affected more than 60K Japanese users were found to be delivered via a compromised website add-on. The tool adds social media sharing buttons on a webpage that may lead to an Adobe Flash exploit.
  • August 19, 2014
    Adware may seem annoying at best when all it does is create pop-up and pop-under ads on your screen. But some adware have hidden capabilities that deliver more harmful malware behind the scenes.
  • August 19, 2014
    While the smartification of the home has its benefits, the growing number of smart devices also requires a lot of time and energy just to maintain and manage the network of connected devices. What does it take to play the role of “Administrator of Things“?
  • August 14, 2014
    Targeted attacks are designed to circumvent existing policies and solutions within the target network, making detection a challenge. To do this, IT administrators need to know what to look for, and where to check for signs of compromise.
  • August 14, 2014
    Scrutinize that Google Drive or Dropbox link before clicking. Spam could be used to distribute backdoors; in this case, the message includes a link that points to a Google Drive URL.
  • August 13, 2014
    Arbitrary code execution - this is the end-result if your Internet Explorer and Windows Media Center are not updated with the August security patches from Microsoft.