While installing antivirus software is a good start to safe Internet browsing, it’s only a start. There is much more you can do to help protect yourself when browsing the Web than merely installing antivirus. Here I’ll share a couple ways. In this article you’ll discover extra security features in Firefox and Chrome, sandboxing to […]
Like most of the network protocols and systems in widespread use today, the Domain Name System (DNS) harbors significant security vulnerabilities. Though DNS provides a deceptively simple service — translating human-friendly website addresses such as http://www.cnn.com into computer-friendly numerical IP addresses such as http://157.166.255.19 — the system’s integrity is a crucial cornerstone of Internet operations […]
Do you manage a Facebook Page for your business or organization? If so, you’re probably aware that many of the same security issues that plague personal profiles also apply to Pages. But what you may not know is that there are several additional security issues that you should be thinking about when managing a Facebook […]
In the earlier days of computers, virus writers and hackers were viewed as fame-seeking and adrenaline-hungry teens with nothing better to do. But as PC usage and the Internet grew, the amount of potential victims grew exponentially and money became the hacker’s greatest motivator; spawning a whole new cyber-lexicon that now includes the term criminal. […]
The effectiveness of malware detection, how well it catches infections, is the chief characteristic to consider when choosing an antivirus program. But resource consumption, how much system resources it uses, is also important. This is especially true on older machines where heavy duty usage by your AV software can bog down the system and […]
Due to the iOS design, there are a limited number of security apps in the Mac App Store. However, jailbreaking your iPhone, iPad, or iPod Touch gives apps more control of iOS and the device. Thus you’ll find more security apps in Cydia and other repositories. The security and stability risks are debatable, but with […]
Deploying WPA2-Enterprise security with 802.1X authentication across your Wi-Fi network of PCs is already quite a task. Adding in support of all the mobile phones and tablets makes it even more daunting. However, there are several solutions out there to help end-users configure their own devices, which can help cut down calls to the IT […]
SUPERAntiSpyware recently released version 5 of their antispyware and malware protection program, which they call their most significant update ever. In this review, we’ll take a look at the updates in regards to both the free and premium editions of SUPERAntiSpyware 5. We’ll see if it’s worth your time and money to use the free […]
The traditional stateful firewall filters traffic based upon ports and protocols. For example, blocking or allowing the entire port 80 for HTTP traffic or port 443 for HTTPS traffic. It’s an “all-or-nothing” approach. Newer firewall technology can also filter traffic based upon the applications or traffic types traversing these ports. For example, you could open […]
The first thing to do is determine the validity of any antivirus alerts. A popular malware technique is to display alerts saying a computer is infected in hopes of the user downloading more malware and/or paying for fake antivirus protection.These programs are often called scareware or Trojan horses. If you receive any antivirus alerts, […]
Subscribe to Cybersecurity Insider for top news, trends & analysis