BullGuard

13 posts categorized "June 2013"

How Advanced Are Persistent Threats, Really?

Posted by kdunlaevy@gmail.com

APT_spearphishingHeavily funded, mass scale hacking operations might look impressive and expensive, but they’re not nearly as sophisticated as they’d have us believe. Recently, IBM released a study that announced most hackers use pretty common techniques to gain access to organizations and to steal their data.

 

» Read more


Category: Internet Security Comments

Why Browser Security Is Vital

Posted by elena.ionica@bullguard.com

Web browser security_blogWeb browsers are a gate open to the internet. Although we may not realize it, we rely extensively on the use of web browsers to read emails or local news, to check the weather forecast or to manage our financial resources.

 

Weak browser security can very often lead to performance issues, malware infections or worse, to cybercriminals stealing your data and gaining control of your system.

 

» Read more


Category: Internet Security, Tips & Tricks Comments

Mobile Malware Triggers

Posted by kdunlaevy@gmail.com

Mobile malware triggers_blogMalware can sit dormant on your smartphone for some time before it is activated and before you become aware of it. Researchers have found that the triggers may be as simple as music and light. Just by pulling out your phone and interacting with it in a cinema could trigger the malware into activation mode, via built-in sensors such as the microphone, camera, vibration sensor or magnetic field monitors. In other words, it’s not just your emails and internet access that makes your mobile susceptible to malware attacks.

 

» Read more


Category: Mobile Security Comments

THE Parent’s Guide To Facebook

Posted by kdunlaevy@gmail.com

Facebook_parents_guide_blogIf you’ve got children, they want to be on Facebook. And for most of those children, online social networking is a reflection of their offline lives; however, for some, just as in their offline lives they sometimes can struggle to resolve their problems or conflicts. This struggle can manifest itself in negative ways online, amplifying and perpetuating the issues; and this is when harassment, cyberbullying and exposure to inappropriate content can happen.

 

» Read more


Category: Internet Security, Social Media Comments

What Do Ransom Demands And Keyloggers Have In Common?

Posted by kdunlaevy@gmail.com

Online privacy-_blogThey’re in cahoots! Reveton malware developers have added keylogging to their ransom demands. This new addition acts as a backup tactic in situations when victims refuse to pay up when held at ransom. Microsoft discovered this tactic in late-May and reportedly, this new method is distributed using the Blackhole Exploit Kit.

 

» Read more


Category: Internet Security Comments

Previous Next




bottom roundness