In the face of increasing concerns over privacy on Facebook and an avalanche of 1 million malicious Android™ apps, Trend Micro supercharges its top ranked mobile security solution.
Make sure you friend Avast on Facebook so you won’t miss our original comic strip, MALWARE ATTACKS!!. Here’s a quick catch-up in case you missed the first installment – We meet unfortunate aliens fleeing their embattled home world in search of help against the evil Malware Empire. The fate of their planet rests on their […]
A good friend of mine called me recently to ask what I knew about scams from online sales. He had placed an ad on CraigsList for something he was trying to sell and had asked for $150 for the item. He had received a call from a woman and she offered to send him a Read more…
Mobile World Congress, or MWC to the veterans, has arrived once again. We’ve been busy preparing for this event for the past couple of months, and now that we’re here, we’re faced with sleep deprivation, increased caffeine intake, and indecision as to whether or not we’ll need a sweater in the confusing Barcelona climate. Nevertheless, Read more…
Em julho de 2011, uma auditoria interna descobriu uma invasão na infraestrutura da autoridade de certificação (CA) DigiNotar, indicando o comprometimento de suas chaves de criptografia. A violação dessas chaves possib…
“Those who would give up essential liberty to purchase a little temporary safety, deserve neither liberty nor safety.” – Benjamin Franklin Personal privacy: It’s a tenant of American citizenship, but also the source of a long-held debate over the balance between an individual liberty and national security. Where should governments draw the line, and what Read more…
Following on from our recent webinar on the theme of website optimisation we have developed a series of three blog posts that discuss website optimisation. These are high level blogs and not intended to be all encompassing but rather have been d…
As promised in our previous blog entry for the recent Adobe Reader PDF zero-day attack, we now offer more technical details on this Reader “sandbox-escape” plan. In order to help readers understand what’s going on there, we first need to provide some background. Adobe Reader’s Sandbox Architecture The Adobe Reader sandbox consists of two processes: Read more…