It’s the Most Wonderful Time… for SEO Poisoning!

SEO poisoning_header
‘Tis the time of year for eggnog and holiday tales. Here is a holiday story for you to be mindful of when browsing online.

When searching for something on the Web, most people type in a few keywords into a search engine, such as Yahoo!, Google, or Bing and press enter. And by the magic of the Internet, you’re presented with a list of results within a fraction of a second.
Continue Reading… It’s the Most Wonderful Time… for SEO Poisoning!

How Your Email Account Could be the Weakest Link to Your Online Accounts

email weakest link header
Our personal email accounts enable us to send and receive messages instantly with people all around the world. While we primarily use our email accounts for communications purposes, many of us use it to sign up for accounts such as online banking, online shopping, social networks, and even alternative email accounts. But have you considered the possibility that your personal email account could be the weakest link? By “weakest link”, we mean that a compromised email account could potentially result in the accounts connected to it being compromised too. That’s why it’s important to address email security from the get go.
Continue Reading… How Your Email Account Could be the Weakest Link to your Online Accounts

The Risks of Public Hotspots: How Free WiFi Can Harm You

Risks of Public WiFi_header
Practically anywhere you go, you’ll come across free WiFi hotspots. However, this free service could spell trouble. We explore the security risks of public hotspots and what to consider before connecting to public WiFi.
Continue Reading… The Risks of Public Hotspots: How Free WiFi Can Harm You

USB Drives: Are You Plugging Malware
into Your PC?

Plugging malware into PC_header
It’s safe to say at one point or another, we’ve all used USB drives to transfer and retrieve files from one computer to the next. As convenient as USB drives are for this purpose, it’s also extremely easy for attackers to distribute malware in the same fashion.
Continue Reading… USB Drives: Are You Plugging Malware into Your PC?

Zero-days: Exploits that Take Advantage of the Unknown

zero-day attack_header
In some ways, protecting your computer safe can be thought of the same way as protecting your home.

In both cases, you have to be concerned about people breaking in, and in both your computer and your home, you need to be sure to lock the doors and turn on the alarm. But what happens if there are doors or windows at your house that you did not realize were open? Suddenly, fortifying your home just became more complicated.
Continue Reading… Zero-days: Exploits that take advantage of the unknown

Thank You!

Thanks for subscribing to our newsletter. You should receive a confirmation email soon.

Subscribe to our newsletter!

Stay updated with the latest security news, tips, and promotions.

zonealarm free av