20 posts categorized "March 2013"

The Biggest DDoS Attack In The History – All You Need To Know

Posted by emma.ban@bullguard.com

Spamhaus DDoS attackDo you ever get emails promoting miraculous weight-loss pills or counterfeit Viagra?  These are probably the spam emails that everyone’s heard of and that frequently land in our inboxes. And they are exactly the type of web content Spamhaus fights against.

» Read more

Category: Internet Security, Security News, Security Opinion Comments

Sir Winston Wishing You A Safe & Happy Easter

Posted by winston@bullguard.com



Happy Easter Holidays! I hope you’re all looking forward to a chocolate-filled few days, and perhaps even a glimpse of the Easter Rabbit.


» Read more

Category: Internet Security, Winston's Comments

Online Behaviour Part 2: How To Avoid Shady Characters Online

Posted by kdunlaevy@gmail.com

Shady online behavior_blogWith billions using the internet daily, it’s important to remember that everyone’s intent online is different, and may not be in line with yours. People may not be who they say they are. So trusting blindly can get you in trouble, and sharing information can also get you in trouble.


» Read more

Category: Internet Security, Online Privacy Comments

The Future Of Digital Wallets. What To Expect?

Posted by kdunlaevy@gmail.com

Digital wallets_blogSmartphones have changed our lives. We’re now able to shop, bank, text and talk, all while out and about. They have become the ultimate accessory, whether you bling out your phone or keep it simple, both say a lot about you. The same used to be true of wallets, but believe it or not, the smartphone is revolutionizing that too – we are fast approaching the day when wallets could be a thing of the past.


» Read more

Category: Mobile Security Comments

How Spearphishing Is Being Made Easy

Posted by kdunlaevy@gmail.com

SpearphishingNo, we’re not talking about the sport. We’re talking about one of the internet security threats that have been making a lot of rounds lately. Spearphishing scams are a more evolved form of traditional phishing – highly targeted efforts at identity theft.


» Read more

Category: Internet Security, Internet Threats Comments


bottom roundness