Search Security

Latest News

What is Antivirus Software?

A daredevil used to be someone who'd jump a motorcycle over a line of cars, or maybe over a giant canyon. Today, it's the person who decides to operate their computer without antivirus software. Simpl

How to Prevent Social Engineering Attacks

Social engineering is one of the most common, and most effective, ways that attackers acquire your personal information to use in some nefarious way. Whether a person tricks you into downloading malwa

Which Types of Encryption are Most Secure?

Encryption can protect your consumer information, emails and other sensitive data as well as secure network connections. Today, there are many options to choose from, and finding one that is both secu

What is Social Engineering?

If you've ever watched the movies “Hackers,” “Sneakers” or “Now You See Me,” you've seen social engineering at work. In each movie, the main characters use psycholo

How to Block Porn Sites on Internet-Connected Devices

When you do a Google search for "porn," you’ll find more than 2 billion (that's billion with a "B") results, and many of those links lead to extremely graphic images, videos

Second-Gen Bitdefender Box Delivers Hassle-Free Smart Home Safety

Contributing writer: Dan Tennant Antivirus maker Bitdefender unveiled a new piece of hardware at CES 2017: the second generation of its Bitdefender Box, a home network security appliance and Wi-Fi ro

Best Endpoint Protection Software Review

When choosing the best endpoint protection for your company, in a very real sense, you are choosing a company to partner with to help manage your company’s security. You are trusting the company

Free Spyware Detectors

Spyware on your computer? It's more likely than you think. 90 percent of Internet-connected computers are infected with some form of spyware. Spyware has become such a large problem that the United

Identity Theft on the Rise Due to Internet Flaws

Constant internet access has become a staple in the average person's life, thanks to the interconnectivity of our smartphones, wearable smart gadgets, and even smart appliances and smart home devices.

Keeping Your Teens Protected From Predators Online

Recently, a judge sentenced Florida-based Lucas Michael Chansler, 31, to 105 years in prison after he pleaded guilty to nine counts of producing child pornography. Chansler is now behind bars, and U.S

5 Tips Parents Should Teach Children About Internet Safety

As a parent, you would never leave your house unlocked with your beloved youngsters inside. Unfortunately, many homes still have one door that swings wide open that could put your kids at risk: the in

Biggest Internet Breaches of 2016 So Far

The internet is a nearly unlimited source of information, and you can access it all at the click of a mouse or the tap of a finger. Most of the time, this information isn’t inherently good or

Your Computer's Own Personal Army: A Comparison of the Top Internet Security Suites

There are hundreds of viruses, malware, ransomware, Trojans, hackers and spyware that threaten to invade your computer and wreak havoc on your files, with dozens more popping up each day. All of these

Knox: Now a Free Mac Encryption Software Option

Mac file encryption software like Knox is hard to find – it encrypts files and then hides them, it scored the highest in our ease-of-use tests, and it's free. It has a few drawbacks, particularly the

The Lowdown on “Free” Anti-Spyware Downloads

You’ve heard of them: free anti-spyware software. You’ve probably been tempted to click on the popup or email that brought you the offer. While some anti-spyware shareware is legitimate and helpful, t

2014’s Biggest Data Breaches

Data breaches in America reached an all-time high in 2014. With people using the internet to review and pay bills online, the web is a perfect place for thieves to attack. In 2014, the largest data b

10 Tips for Securing Your Mac

Mac computers are some of the most secure, experiencing much fewer cases of malware infection than their Windows counterparts. However, this is not to mean that they are malware-proof or that Mac user

10 Actionable Tips to Avoid Phishing Attacks

Identity thieves bait for their phishing schemes in many different ways, often posing as trusted businesses or organizations such as banks or the IRS. Learning how to avoid phishing attacks keeps you

How Do Computers Get Viruses?

Computer viruses and other malware are designed to spread. They jump from computer to computer, using network connections to infiltrate a computer's files and install software that steals your money a

What Types of Spyware are Out There?

Spyware is any software that obtains information from a PC without the user’s knowledge. There are many different types of spyware operating on the Internet but you can generally group them into two c

More News

More Top Stories