Category Archives: Consumer Alerts

Avast 2015 simplifies security for you, your PC, and your home

Back in the old days, when we only had a desktop PC, security was simpler. But now, with multiple devices and an increasing variety of attack methods, keeping everything secure and up-to-date can be a daunting task. Avast 2015 simplifies the task with the best antivirus and anti-malware protection possible, the ability to remove annoying […]

Avast 2015 simplifies security for you, your PC, and your home

Back in the old days, when we only had a desktop PC, security was simpler. But now, with multiple devices and an increasing variety of attack methods, keeping everything secure and up-to-date can be a daunting task. Avast 2015 simplifies the task with the best antivirus and anti-malware protection possible, the ability to remove annoying […]

Avast 2015 protection expands to include your home router

Our digital world has expanded from desktop to mobile and now increasingly to the Internet of Things. The gadgets we own and use every day are “smart” – from watches that track our fitness to TVs that know the types of shows we like to watch to digital thermostats that control the temperature in our […]

Avast 2015 protection expands to include your home router

Our digital world has expanded from desktop to mobile and now increasingly to the Internet of Things. The gadgets we own and use every day are “smart” – from watches that track our fitness to TVs that know the types of shows we like to watch to digital thermostats that control the temperature in our […]

Ebola scams spread faster than actual disease in panic-striken U.S.

Cybercrooks use popular stories in the news to deceive people into giving up confidential information. The dreaded disease Ebola that is spreading rapidly throughout West Africa made landfall in the US recently, and since then many news agencies have sensationalized the “outbreak” with constant coverage. Panic has grown as politicians raise the public’s fears and […]

Ebola scams spread faster than actual disease in panic-striken U.S.

Cybercrooks use popular stories in the news to deceive people into giving up confidential information. The dreaded disease Ebola that is spreading rapidly throughout West Africa made landfall in the US recently, and since then many news agencies have sensationalized the “outbreak” with constant coverage. Panic has grown as politicians raise the public’s fears and […]

“Poodle” security hole has a nasty bite

      No Comments on “Poodle” security hole has a nasty bite

A security hole called Poodle could allow hackers to take over your banking and social media accounts. Yesterday, Google researchers announced the discovery of a security bug in version 3 of the Secure Sockets Layer protocol (SSLv3). This web technology is used to encrypt traffic between a browser and a web site, and can give […]

“Poodle” security hole has a nasty bite

      No Comments on “Poodle” security hole has a nasty bite

A security hole called Poodle could allow hackers to take over your banking and social media accounts. Yesterday, Google researchers announced the discovery of a security bug in version 3 of the Secure Sockets Layer protocol (SSLv3). This web technology is used to encrypt traffic between a browser and a web site, and can give […]

5 steps to keep your SMB data protected

      No Comments on 5 steps to keep your SMB data protected

When Edward Snowden came forward in May 2013, accusing the world’s largest intelligence service of spying on US allies, people, and private companies, it became evident that electronic data is quite vulnerable. This major event even caused Russian and German government officials to consider cataloguing their data, using old-fashioned manual typewriters instead of computers. Should […]

5 steps to keep your SMB data protected

      No Comments on 5 steps to keep your SMB data protected

When Edward Snowden came forward in May 2013, accusing the world’s largest intelligence service of spying on US allies, people, and private companies, it became evident that electronic data is quite vulnerable. This major event even caused Russian and German government officials to consider cataloguing their data, using old-fashioned manual typewriters instead of computers. Should […]