5 Online Tax Scams to Avoid in 2013

With tax season right around the corner, it's time to prepare for another season of IRS scams designed to lure you into fake websites, steal personal information, and separate you from your hard-earned money. Each year, thousands of people are victims of online tax scams. The good news is that the IRS is getting better at identifying these scams. According to a recent IRS report, they protected more than $1.4 billion of taxpayer funds from getting into the wrong hands in 2011. As the tax deadline approaches, cybercriminals will be devising new ways to trick you with fake IRS emails, websites, and malicious ads. Here are five online scams to watch for and avoid: Read more >

Don't Fall for Fake Valentine's Day Messages

Exchanging Valentine's Day cards and gifts is a fun tradition...unless the message is really an attempt to trick you into buying a non-existent product or visit a malicious website. Here are a few Valentine's Day scams we expect to see this year: Read more >

The Automated Home of Tomorrow: How Vulnerable is it to Cybercrime?

With a host of new smart TVs, automated home systems, coffee makers, and other Internet-enabled devices now available, we have to ask, "How safe is it to connect these new devices to the Internet?" Our infographic illustrates several different Internet-enabled devices and their potential security risks. Read more >

Smartphone Cyber Attacks to Grow in 2013



Smartphones are everywhere—kids, consumers and businesses have all embraced these amazing devices—and hackers are taking advantage of these new targets. Because smartphones run the same software as many computers, they have similar vulnerabilities, which hackers can target. But smartphones have other capabilities, including their connection to other devices, like Bluetooth, that hackers can exploit. Read more >

Learn How to Protect Your Android Smartphone from Malicious Apps

What's the difference between a secure Android smartphone and one that downloads apps without a security solution installed? Watch the video and learn how to avoid data theft, spyware, and more.

2012 Annual Security Roundup: Post-PC Threats

As computing moved from desktops and laptops to include mobile devices like smartphones and tablets, cybercriminals took advantage of these new targets in 2012. For example, the number of malware targeting Android devices grew to 350,000 from just 1,000 in 2011, while many familiar threats—like data breaches, phishing messages, and ransomware-evolved to be more evasive with the help of Exploit Kits. Read the TrendLabs Annual Security Roundup to learn more about this new generation of threats—and how you can stay protected.