Tip of the Week: U.S. Government Teaches How to Avoid Phishing Attacks

The United States Computer Emergency Readiness Team (US-CERT) strives for a safer, stronger Internet for all Americans by responding to major incidents, analyzing threats, and exchanging critical cyber security information with trusted global partners. The organization’s Security Tip named “Avoiding Phishing Attacks” explains how to avoid being a victim and what to do if you become a victim.

Read more…

Don’t Like Mondays? Neither Do Attackers

You can reduce potential damage to your PC by paying attention to when attackers are most likely to strike. Monday may be our least favorite day of the week, but Thursday is when you should watch out for cyber criminals, researchers say. That’s what reports CSO, the security news portal that writes about threats and cyber attacks, and which is affiliated with IDG, the world’s leading tech media company.

Read more…

Tip of the Week: Dads and Moms United Against Ransomware

Friday after work with the kids at the park. Ian on the swings, Max on the teeter-totter with Kayla, and a few of us parents got talking. Laney’s mom, Evan’s dad, just chatting the way we do. And Luke’s parents started telling us about how their PCs got hacked, totally taken over. It wasn’t a regular worm, it was ransomware. The hackers demanded they pay a ransom to unlock their PCs.

Read more…

What is Ransomware – From A to Z

Every 10 seconds, a PC user gets hit with ransomware, making consumers the most targeted for attacks. But… What is Ransomware? How does it work? What’s the most popular type? How is it delivered? What’s the cost of ransomware attacks? Why home PC users should pay attention? How can you protect your PC? ZoneAlarm Anti-Ransomware brings you all these answers and more. Read more…

PCMag: ZoneAlarm Anti-Ransomware ‘a Clear Winner’

Ransomware has been all over the news recently, as a spate of attacks by cyber criminals have been carried out the world over. It does not try to destroy your computer, but rather targets the files and locks your data. The cyber criminals then hold the files to ransom, demanding that you pay to access them again. If there is no payment, the price of the ransom could rise or the hackers could destroy your files. Read more…