Trend Micro Announces New Mobile Security for Consumers with Privacy Protection for Facebook

In the face of increasing concerns over privacy on Facebook and an avalanche of 1 million malicious Android™ apps, Trend Micro supercharges its top ranked mobile security solution.

Malware Attacks

      No Comments on Malware Attacks

Make sure you friend Avast on Facebook so you won’t miss our original comic strip, MALWARE ATTACKS!!. Here’s a quick catch-up in case you missed the first installment – We meet unfortunate aliens fleeing their embattled home world in search of help against the evil Malware Empire. The fate of their planet rests on their […]

Just One of Many Internet Scams

      No Comments on Just One of Many Internet Scams

A good friend of mine called me recently to ask what I knew about scams from online sales. He had placed an ad on CraigsList for something he was trying to sell and had asked for $150 for the item. He had received a call from a woman and she offered to send him a Read more…

MWC 2013: What’s the Hot Ticket?

      No Comments on MWC 2013: What’s the Hot Ticket?

Mobile World Congress, or MWC to the veterans, has arrived once again. We’ve been busy preparing for this event for the past couple of months, and now that we’re here, we’re faced with sleep deprivation, increased caffeine intake, and indecision as to whether or not we’ll need a sweater in the confusing Barcelona climate.  Nevertheless, Read more…

Taking Privacy to Extremes: What Consumers Need to Know

“Those who would give up essential liberty to purchase a little temporary safety, deserve neither liberty nor safety.” – Benjamin Franklin Personal privacy: It’s a tenant of American citizenship, but also the source of a long-held debate over the balance between an individual liberty and national security. Where should governments draw the line, and what Read more…

Making the most of website analytics

      No Comments on Making the most of website analytics

 
Following on from our recent webinar on the theme of website optimisation we have developed a series of three blog posts that discuss website optimisation. These are high level blogs and not intended to be all encompassing but rather have been d…

Digging Into the Sandbox-Escape Technique of the Recent PDF Exploit

As promised in our previous blog entry for the recent Adobe Reader PDF zero-day attack, we now offer more technical details on this Reader “sandbox-escape” plan. In order to help readers understand what’s going on there, we first need to provide some background. Adobe Reader’s Sandbox Architecture The Adobe Reader sandbox consists of two processes: Read more…