17 hrs ago
Hotspot Shield Crosses 10M Installations On Android And iOS, Showing Strong Appetite For Mobile VPN
Virtual private networking is a great way to accomplish a number of things, including making sure that your secrets stay your own, protecting against malware attacks, and getting around the geoblocking of audio and video content from networks, labels and basically anyone who wants to restrict your sweet, sweet access.
57% of companies fail to control applications used by employees
Restricting the launch of third-party applications enhances the security of corporate workstations and increases employee efficiency.
Mon May 20, 2013
Boot up: Samsung's 10m S4s, NFC's double counts, Google's un-openness, and more
Plus Nokia Asha's unique selling point, the point of a Google Music service, what Apple needs at WWDC, and more Stealthy Mac OS X spyware that was digitally signed with a valid Apple Developer ID has been detected on the laptop of an Angolan activist attending a human rights conference, researchers said.
Sun May 19, 2013
Espionage and sabotage in the virtual world
They have a shared interest in tackling the myriad established and nascent online threats.
Operators of Two Bogus Tech Support Schemes Settle FTC Charges
Two operators of alleged tech support scams have agreed to settle Federal Trade Commission complaints and give up their ill-gotten gains.
Fri May 17, 2013
Alleged tech support scammers settle FTC charges
Operators of two alleged tech support scams that charged consumers hundreds of dollars to supposedly fix their computers have settled charges from the U.S. Federal Trade Commission.
New Mac spyware found on Angolan activist's computer
Previously unknown Mac OS X spyware, signed with a valid Apple Developer ID, has turned up on the laptop of an activist from Angola at a human rights conference in Norway.
Thu May 16, 2013
Newly Discovered Mac Malware Captures and Stores Screenshots
New Mac spyware was discovered earlier this week on a computer at the Oslo Freedom Forum , an annual human rights conference.
New Mac spyware discovered at Oslo conference
Today security firm F-Secure announces the discovery of a new Mac-based spyware program, the latest in what has become a small, but growing trend.
Finextra Research news
Mobile payments expansion spawning criminal undergound
The Anti-Phishing Working Group is calling for a global, co-ordinated response to the threat posed by mobile malware and an emerging underground criminal marketplace lured by an expansion in m-payments and banking.
Wed May 15, 2013
Malware protection for your smartphone
Mark Huffman has been a consumer news reporter for ConsumerAffairs since 2004. He covers real estate, gas prices and the economy and has reported extensively on negative-option sales.
Security IQ Quiz: How You Scored
At PCMag we regularly publish articles explaining in detail the differences between the various types of malware.
Mobile Adware Networks Given 45 Days to Stop Misbehaving by Security Firm
Techworld - Misbehaving adware buried inside mobile apps has turned into such a problem that security vendor Lookout Mobile Security has published a deadline for networks to change their behavior or face blacklisting.
5 Essential Steps for Keeping Your Computer Safe
Computers house so much of our personal data that it's essential to set up protective measures in case of cyber attack or mechanical failure.
Media Alert: New Attacks Detected by Recently Introduced Check Point Threat Emulation Software Blade
Check Point Software Technologies Ltd . , the worldwide leader in securing the Internet, today announced the detection of evolving phishing and bot attacks by Check Point Threat Emulation Software Blade.
Tue May 14, 2013
Webroot Enhances VeliQ's Mobility Platform as a Service with...
Webroot , a leader in cloud-based security intelligence solutions, announced today a strategic partnership with VeliQ , the innovator in enterprise mobility management solutions.
5 Computer Programs My Small Business Should Consider
Small business is run more and more through the internet. While companies are using browsers other than Internet Explorer, like Chrome and FireFox, there's other programs that can be used to make your small business run faster.
Customer Interaction Solutions
Q1 2013: Game Changer for Android Malware?
The first quarter of 2013 was marked by firsts for Android malware that add complexity to the Android threat landscape.
Mon May 13, 2013
Frontier Communications' Frontier Secure Wins F-Secure Excellence Award
Excellence Award on May 7 during the Seventh Annual SPECIES Conference in Stockholm, Sweden.
Microsoft Tech Support Scams: Why They Thrive
Consumers: Hang up on anyone who cold-calls offering Windows technical support, never believe an Internet pop-up that reports your PC is infected with malware, and, above all, don't ever install software from an untrusted source who offers to rid your PC of viruses, perhaps for free.