Malware to target Harry Potter fans

Cybercriminals are pushing “blackhat” search engine optimization tactics to target the most popular file sharing and P2P networks, pursuing those interested in upcoming movie releases and in particular taking advantage of the sizeable Harry Potter fan base wanting to download the movie in advance of its screening.

» Read more

How To Keep Your Computer Malware-Free

There is partial truth in the statement given by conspiracy theorists – You are being watched by someone. Software that gathers your personal information without you being aware, brings undesired change in the configuration of your computer or takes the control of your computer is called malware or spyware. The first step in protecting your computer system is detection of malware in order to remove it and save the system from damage. The second step is to keep malware away from your computer.

» Read more

Protect yourself against phishing attacks

Malware is becoming increasingly sophisticated and prevalent. Cybercriminals are continuously developing advanced techniques to lure you into their traps. You don’t have to go out of your way to visit dodgy websites to get scammed these days. Cybercriminals will lure you there by pretending to be legitimate sources of information.

» Read more

Safer For Gamers

Level Up! hosts and distributes two Massively Multiplayer Online Role playing Games (MMORPG) titles in the Philippines: Ragnarok and Oz world. Both games are among the most popular in the country, with Level up! among the first companies to enter the now hotly contested online games market.

Early on, Level Up! realized that it had to protect its gaming network infrastructure, which serves some 1 million subscribers.

Complicating the security picture: Of the million subscribers, 31 per cent are users who play from home and 42 per cent long on from Internet cafes. About 23 per cent of users play games from both locations.

» Read more

Avira Premium Security Suite 8.2 Review

Avira’s security suite is more suitable for a techie looking for an ideal malware detection system that doesn’t need parental controls or phone support.

Avira Premium Security Suite topped in the very task for which it has been created and it costs only $54 for single user according to the information collected latest by 23rd Nov. 2008. This product has continued the well-known performance of all other past products of Avira, by convincingly staying ahead in the test of “Paying for Protection”, for our nine security suites test, 2009 and in several other detection tests.

» Read more

Comodo Internet Security Pro

The first generation suite of Comodo still has a long way to go.

Comodo Internet Security Pro 3.8 is the first version of its kind in the market of Internet security suite, whose price for single user (one year) is $40 and its three user license hasn’t been listed yet as of May 5, 2009. According to our testing and use, Comodo Internet Security shows that it is indeed its first time to come out in the market, as its performance was not at all convincing. While we were testing the Internet Security Pro 3.8 it was reported that, Comodo released its next version, Internet Security Pro 3.9. With this new release Comodo tried to fix some of the performance related problem with the Internet Security Pro 3.8 like, the dynamic file inspection, which was included to act as a real time virus scanner.

» Read more

Wireless security: Hyper techniques

Interest in wireless technologies as a means of extending a company’s network infrastructure has grown exponentially almost overnight. Not only has there been more curiosity from customers, who see the obvious advantages, but suppliers of wireless network hardware have been busy churning out innovative products in a bid to claim niche market space. Unfortunately, over shadowing this popularity are questions about wireless security, which have plagued the industry since the technology started gaining acceptance. These security issues, though widely communicated and understood, did surprisingly little to slow down the adoption of wireless technology by enterprises.

» Read more
1 2 3 4