Smartphone Viruses Are Real: How To Stay Protected
The last thing you want is a latent Trojan that sits in the background and steals all of your sensitive data. Think you’re safe from a smartphone infection? I wouldn’t be too sure. Viruses are most...
View ArticleCybercrime Goes Offline: The Role of Bitcoins In Ransom and Extortion
“We have your private data. Send us $300 or we’ll destroy all of it.” That’s not a message you ever want to receive. In the past few years, hundreds and thousands of users – people like you and me –...
View ArticleHow Accurate Are These 4 Big Name Virus Scanners?
If you’re not using an anti-virus suite, but have discovered that living dangerously has led to your PC behaving oddly, there’s a fair chance that your system has been infected by some form of malware....
View ArticleCryptoLocker Is Dead: Here’s How You Can Get Your Files Back!
Good news for anyone affected by Cryptolocker. IT security firms FireEye and Fox-IT have launched a long-awaited service to decrypt files held hostage by the notorious ransomware. This comes shortly...
View ArticleLet’s Put A Stop To Pop-Up Browser Ads Once And For All!
Chances are that you have encountered a pop-up advertisement at some time in your online life. These pop-ups can appear out of nowhere and surprise you, and if you panic you may make a stupid mistake....
View ArticleTorrentLocker Is A New Ransomware Down Under. And It’s Evil.
Cryptolocker might be dead and buried, but there’s a new piece of malware looking to take the Ransomware crown. It’s called TorrentLocker, and it’s positively evil. TorrentLocker is said to borrow...
View ArticleFive Facebook Threats That Can Infect Your PC, And How They Work
Do you remember how life was without Facebook? Probably not. The site has pervaded our lives and it is no surprise that Facebook is now prime hunting ground for anyone with nefarious intentions. They...
View Article4 Compelling Security Reasons Not To Jailbreak Your iPhone or iPad
iOS is one of the most secure, safest mobile operating systems out there, but this security also comes with a lot of restrictions; the App Store is very tightly policed, and it’s impossible to install...
View ArticleMeet Kyle And Stan, A New Malvertising Nightmare
Meet Kyle and Stan. No, I’m not talking about the potty-mouthed duo from South Park, but rather the latest Malvertising network from hell. It’s ingenius. It’s pernicious. And it threatens both Mac and...
View ArticleSmartphone Security: Can iPhones Get Malware?
Apple has historically marketed its desktop products as being impervious to the rampant malware that plagued Microsoft systems in the early 2000s, but the iPhone’s swelling popularity has made it a...
View ArticleFBI Ransomware Hits Android: How To Avoid Getting It, And Remove It
One of the most intimidating malware threats, FBI Ransomware, has hit Android – pretending to be the FBI while leaving users who install seemingly innocuous apps feeling pressured into paying $300 to...
View ArticleHewlett-Packard Breaks In Two, Redbox Instant Shuts Down, And More… [Tech...
Also, Microsoft RoomAlive, Jimmy Kimmel malware, free Instapaper, Windows 95 on a smartwatch, and Destiny’s honest game trailer. Hewlett-Packard Splits In Two Hewlett-Packard is set to be split into...
View ArticleWhat Is The Best Free Antivirus Software? [MakeUseOf Poll]
No matter how careful you are when using the Internet, it’s always advisable to have antivirus software installed on your computer. This applies mostly to Windows users, because while Macs aren’t...
View Article3 Tools To Monitor & Examine The Windows Registry
The Windows registry is one of the most poorly understood parts of the Windows operating system. Understanding it, and using appropriate tools to manage it, can make the difference in having a...
View ArticleAmazon & Hachette Make Peace, Windows 10 Phones, & More… [Tech News Digest]
Also, Apple downplays Masque Attack, Where To Watch TV, become an Amazon drone test pilot, and 20 years of PlayStation. Amazon & Hachette Bury Hatchet Amazon and Hachette have resolved their...
View Article