We come across a plenty of malware reports every day. Sometimes we have to deal with some special cases, where a respected vendor is involved. This time it was the Dell driver download site. The “Download file” link leads to this unexpected screen (our user complained about a false positive): Well, being an average user, […]
As you may recall from earlier posts in my blog, a denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated through the hacker’s botnet, or network of infected computers. Usually, when a cybercriminal launches a DDoS attack on a website, there isn’t much for Read more…
Once you start using avast! Free Antivirus, you quickly realize what a quality product it is and want to share it with your family members and friends. We have created an easy way for you to recommend avast!, and at the same time earn points toward a free 1-year license of avast! Internet Security. The […]
New research has concluded that despite best efforts to keep search results clean, Google and Bing often serve malware-infected sites among their top search results. This malware (or malicious software) can include sites infected with viruses, Trojans, computer worms, and more, making it extremely important for consumers to pay close attention to what they click. Read more…
Seventy-three year old Menachem Bodner lost his twin brother Jeno (Jolli) 68 years ago when the Auschwitz concentration camp was liberated. He knows only one thing about his brother: The Auschwitz ID number tattoed on his arm – A 7734. With the help of his grandchildren and genealogist Ayana KimRon, Mr. Bodner is now using […]
According to a recent survey, nearly half of all consumers believe that their smartphones and other mobile devices are less secure than their laptop or desktop computers. In the same survey, only 36% of respondents said they trust online retail sites to keep their personal data safe. Still, holiday shopping from mobile phones increased by Read more…
We’ve always been told to “read the fine print before you sign on the dotted line,” but let’s be frank. In today’s digital world, all we want to do is play that new game, test that new app and hear that new song. The fine print seems like an unnecessary barrier to our fun. Most Read more…
“Malware” is a shortened version of the words malicious software. It is defined as: a generic term used to describe any type of software or code specifically designed to exploit a computer/mobile device or the data it contains, without consent. Most malware is designed to have some financial gain for the cybercriminal. Whether they are Read more…
Question of the week: Since I have been using avast! I have been conscious of staying secure online. Does it matter which search engine I use? Is one safer than the other? Thanks for using avast! to protect your computer. Yours is a great question, but maybe not one that people consider when thinking about the […]
Do you use the same smartphone at home and at work? Whether your company allows employees to bring in personal devices or issues office-specific phones and laptops, those devices likely contain sensitive corporate and personal information. Unfortunately, many people use these devices in ways that can jeopardize the security not only of your personal data Read more…