- August 19, 2014Adware may seem annoying at best when all it does is create pop-up and pop-under ads on your screen. But some adware have hidden capabilities that deliver more harmful malware behind the scenes.
- August 14, 2014Targeted attacks are designed to circumvent existing policies and solutions within the target network, making detection a challenge. To do this, IT administrators need to know what to look for, and where to check for signs of compromise.
- August 14, 2014Scrutinize that Google Drive or Dropbox link before clicking. Spam could be used to distribute backdoors; in this case, the message includes a link that points to a Google Drive URL.
- August 13, 2014Arbitrary code execution - this is the end-result if your Internet Explorer and Windows Media Center are not updated with the August security patches from Microsoft.
- August 12, 2014Think all apps in your smartphone and tablet are secure? Our analysis on the FakeID vulnerability might change the way you use your apps.
- August 12, 2014Security issues such as the Heartbleed bug and a number of huge data breaches were the main attractions of the second quarter of 2014. Targeted industries and security companies responded in varying fashion, all in the name of protecting end-users.
- August 11, 2014Cybercrime using targeted attack methods, botnets, and web defacement - these are some of the threats that have evolved and are thriving in Africa. What used to be the originators of the 419 Nigerian scam have embraced and allowed new threats.
- August 07, 2014Trend Micro research found that the attackers who compromised Gizmodo Brazil used vulnerable WordPress plugins in the attack. WordPress users are advised to enforce strong passwords and study theme codes carefully before deploying them.
- August 06, 2014Thinking and recalling strong passwords can be a challenge, especially for multiple accounts. If you don't want to trust your security to a password manager, here are a number of ways you can create strong passwords that you can remember.