Your Smart Gadget Just Might be a Privacy Risk

Internet of ThingsNow that the holiday season is behind us, it’s time to get back to the important things in life, the things that really matter most – presents. Chances are, among your pile o’ gifts there were some internet-connected gadgets and they, like any internet-connected device, can be a security and privacy risk.

We’ve come up with some simple things you can do to guarantee your privacy without much hassle.

Read more…

A Sneak Peek Inside a Hacker’s Toolbox

Hacker Toolbox

Do you have a favorite household gadget? Do you reach for your drill or take out your handy roll of duct tape whenever there’s a problem? Most of us have tools that we are partial to, our tried and true saviors that have gotten us out of a bind time and time again.

When it comes to cybercrime, hackers also tend to stick with certain tools, ones that are proven to be more effective and more forceful than the rest. Sure, sometimes hackers may go out on a limb and experiment with a new technique, but by and large, the threats we face all stem from the same tactics, with some tweaks to the code here and there. In 2015, there were some things that proved essential in so many hackers’ tool kits – Why bother with originality when the old tried and true tools work so well?

It’s these standbys that we have to be the most vigilant about, and there’s a lot we can learn from these tools about how we arm ourselves better for 2016 and beyond.

Read more…

The Biggest Hacks of 2015

Biggest Hacks of 2015

It’s been said before and we’ll say it again – 2015 was the year of the hack.

Sure, there were major hacks and breaches before 2015, but this was the year when hacking became de rigueur, when hacks went mainstream and became front page news. Often. Very often.

One of the most intriguing aspects of the hacks of 2015 was the scope. No sector was spared from data breaches, from top universities to federal agencies to Steam. It seems like everybody was targeted in 2015, as if the perps did their utmost to reach the widest range of victims.  Profiled below are an assortment of people and the hacks that affected them most this year.

Read more…

Threats to Watch Out for in 2016

Virus Detected

2015 is drawing to a close and that can mean only one thing – it’s time to make 2016 predictions! Some people like to prognosticate about which celebs will be dating; others focus on economic forecasts. Some people attempt to prophesy the outcomes of their fantasy football leagues.

Here at ZoneAlarm we extend our totally secure, all the time mantra to peering into the future as well. After all, the bad guys always have one eye on the future, so you should too if you want to stay safe.

To that end, we bring you ZoneAlarm’s predictions for the top 4 PC threats in 2016. These threats are already active, but they seem to be ramping up their game in an alarming way and all of us need to be prepared for them.

Read more…

Trusty Tips for Safer Tech Toy Shopping in 2015

Toys toys toysLooking for the perfect holiday gift for the kids in your life? How about a fuzzy knit sweater? Too itchy. A pair of mittens? They’ve probably got dozens. Some peppermint chocolates? Just think of the cavities.

When it comes to gift-giving in 2015, the magic word for both givers and receivers this year is technology. Kids and adults alike are pining for new technological gadgets that can do things most of us never dreamed of in holiday seasons of the past. Read more…