BullGuard

14 posts categorized "November 2012"

Sharing And Downloading. Safe And Simple

Posted by kdunlaevy@gmail.com

Share_safely_blogHow many times a day do you download some sort of file? We’re talking .pdfs, photos, apps, games, music, word and excel docs - they all addup, don't they?

 

Have you ever given much thought to what you could be exposing your computer, tablet or phone to?

 

» Read more


Category: Internet Threats, Tips & Tricks Comments

Top 10 Worst Computer Infections of 2012, So Far

Posted by andreea_ostache@bullguard.com

Computer infections_blog

Malware (malicious software) is ever becoming more aggressive and more complex. There have been numerous attacks on all major servers of the world in 2012, and home computers were the target of a multitude of malware infections and their variations.

 

 

» Read more


Category: Internet Threats, Tips & Tricks Comments

Privacy On Your Mobile?

Posted by kdunlaevy@gmail.com

Mobile privacy_blogWith 1 in 3 of you expressing privacy as your number one concern when using your mobile phone, we thought it an important discussion to have.

 

As more and more mobile apps become available and download rates increase, the mobile world is becoming a bigger target for cybercriminals. So, what can you do to protect yourself and, more importantly, your privacy?

» Read more


Category: Mobile Security Comments

To Fake Or Not To Fake

Posted by emma.ban@bullguard.com

Fake_blogYour Name on Facebook and Twitter?

 

A week ago, a UK Government official advised web users to use fake details, names and other personal information when logging in to social media websites. His statement sparked controversy and was frowned upon by fellow politicians.

» Read more


Category: How we think, Social Media Comments

Angry Birds And Star Wars

Posted by kdunlaevy@gmail.com

 

Angry Birds_Star Wars_blog

There will now be Angry Birds in space. Except, they will be bird versions of Luke Skywalker, Ben Kenobi and Leia, with stormtrooper pig versions of Darth Vader.

» Read more


Category: Mobile Security Comments

Previous Next




bottom roundness