For Multiple Devices
Protection for up to 10 devices
Protection for up to 5 devices
Protection for up to 3 devices
Protection for mobile devices
Free online security scan
Smart Home protection
Identity theft protection
Secure password management
Safari ad blocking
Performance & Utility
Scam and misinformation detection
Digital parenting tool
Personal IT helpdesk
Maintain PC Security
Virus removal, PC tune up, and more
Asia & Pacific
Middle East & Africa
I want to...
OMG Mirai Variant Turns IoT Devices Into Proxy Servers
February 28, 2018
A new Mirai variant, dubbed as OMG (detected by Trend Micro as ELF_MIRAI.AUSX), was found targeting Internet of Things (IoT) devices and turning them into proxy servers.
Vulnerabilities can Let Hackers Hijack Tinder Accounts with Just a Phone Number
February 27, 2018
Security researcher Anand Prakash uncovered vulnerabilities in Tinder and the way it uses Facebook’s Account Kit.
A Look Into the Most Noteworthy Home Network Security Threats of 2017
Routers are the gateways to all internet-connected devices in homes. They could also be potentially welcoming a bevy of home network threats risking users’ information and security.
2017 Mobile Threat Landscape
February 26, 2018
We delved into 2017’s most notable threats to see what lies ahead in the mobile landscape, and what users and organizations can do to navigate it in 2018 and beyond.
Security 101: Digital Extortion in 2018
February 13, 2018
Digital extortion is one of the most lucrative ways cybercriminals can profit in today’s threat landscape. Many have fallen victim to this particular scheme and been bilked of their money
Scammers Now Taking to Social Media to Steal Bitcoins
February 08, 2018
Scammers have found ways to give the rather dated Nigerian Prince scam a new twist: Abuse social media to steal cryptocurrency such as ethereum or bitcoin.
OSX.CreativeUpdate macOS Cryptocurrency Miner Distributed via MacUpdate
February 06, 2018
Cryptocurrency-mining malware entered the macOS scene in 2011 as a bitcoin-mining backdoor embedded in applications distributed via torrents.
Data Privacy in the Age of IoT
February 01, 2018
On Data Privacy Day, January 28th, we should have all taken a few moments to think more carefully about safeguarding our personal data, staying safe online, and improving our privacy habits.
Digital Extortion: A Forward-looking View
January 30, 2018
In 2017, we saw digital extortion increasingly become cybercriminals’ first and foremost money-making modus operandi.
Page 22 of 25 << ... 20 21 22 23 24 ... >>