While installing antivirus software is a good start to safe Internet browsing, it’s only a start. There is much more you can do to help protect yourself when browsing the…
Like most of the network protocols and systems in widespread use today, the Domain Name System (DNS) harbors significant security vulnerabilities. Though DNS provides a deceptively simple service — translating…
Do you manage a Facebook Page for your business or organization? If so, you’re probably aware that many of the same security issues that plague personal profiles also apply to…
In the earlier days of computers, virus writers and hackers were viewed as fame-seeking and adrenaline-hungry teens with nothing better to do. But as PC usage and the Internet grew,…
The effectiveness of malware detection, how well it catches infections, is the chief characteristic to consider when choosing an antivirus program. But resource consumption, how much system resources it…
Due to the iOS design, there are a limited number of security apps in the Mac App Store. However, jailbreaking your iPhone, iPad, or iPod Touch gives apps more control…
Deploying WPA2-Enterprise security with 802.1X authentication across your Wi-Fi network of PCs is already quite a task. Adding in support of all the mobile phones and tablets makes it even…
SUPERAntiSpyware recently released version 5 of their antispyware and malware protection program, which they call their most significant update ever. In this review, we’ll take a look at the updates…
The traditional stateful firewall filters traffic based upon ports and protocols. For example, blocking or allowing the entire port 80 for HTTP traffic or port 443 for HTTPS traffic. It’s…
The first thing to do is determine the validity of any antivirus alerts. A popular malware technique is to display alerts saying a computer is infected in hopes of…