Intentional security holes

Sinkholes and watering holes are two words not automatically associated with computer security, yet they are in use to describe two tactics that are used in this field.

Read more

Explained: typosquatting [updated]

Typosquatting is a term you may have seen when reading about internet scams. In essence it relies on users making typing errors (typos) when entering a site or domain name.

Read more

How your business can avoid potentially unwanted programs

We’ve come up with a PUPs cheat sheet that businesses can use to train IT staff and users. A little PUPs awareness, if you will. Read on to learn more about how you get PUPs,

Read more

BleepingComputer Defends Freedom of Speech

A software development company, Enigma Software Group, is suing Bleeping Computer because of a negative review posted on the site about their product.

Read more

Scheduled Tasks

Since the introduction of Task Scheduler 2.0, the Scheduled Tasks use xml files and the .job extension. What hasn’t changed, is the extensive use of Tasks by Adware and other Potentially Unwanted Programs.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language