Quantcast
Channel: Security and Privacy – 404 Tech Support
Browsing all 109 articles
Browse latest View live

Malwarebytes acquihires duo behind AdwCleaner

Malwarebytes announced today that they have acquired AdwCleaner, the popular utility used to clean up adware, toolbars, and other potentially unwanted programs. Version 6 of the program was released...

View Article


Cisco investing $10 million in cybersecurity with scholarship program

Cisco is investing $10 million in the industry with its Cybersecurity Scholarship program. They are introducing two new CCNA Cyber Ops security certificates and for those awarded the scholarship, they...

View Article


Symantec Endpoint Protection 14 released, takes advantage of Bluecoat...

Symantec announced that the latest version of their enterprise antivirus is now available. Symantec Endpoint Protection 14 brings two new features to the product line that is sure to give them an...

View Article

Shodan – the search engine for Internet-connected devices

Shodan, taking its name from the AI in the System Shock video game series, is a search engine for devices reachable on the Internet. The index is built by crawlers scanning the web 24/7 looking for...

View Article

Malwarebytes 3.0 released

Malwarebytes has released version 3.0 of their antimalware product. The new features include scanning four times faster, anti-exploit and anti-ransomware signature-less technology, and a new user...

View Article


Don’t forget printers in your IoT security

This is a sponsored post written by me on behalf of HP MPS. All opinions are 100% mine. Internet of Things security is garnering a lot of discussion after the Mirai botnet took down several popular...

View Article

Gmail will block .js attachments

Google has announced that Gmail including G Suite (formerly Google Apps) will begin blocking attachments with the file extension of .js. This means you will not be able to send .js (typically...

View Article

AV-Test announces 2016 Endpoint Protection awards; Gartner updates antivirus...

AV-Test, an independent institute that evaluates antivirus products, has awarded their 2016 best product awards. Fifteen awards were presented across different categories such as Protection,...

View Article


First release since the AVG acquisition, Avast 2017 available

Avast 2017 was released today for the free and paid markets. Avast Free Antivirus, Avast Pro Antivirus, Avast Internet Security and Avast Premier were all updated with new features to improve...

View Article


Pre-order study resources for CompTIA’s new CyberSecurity Analyst CSA+...

CompTIA launched a new certification for those in cybersecurity called CSA+. It builds upon the Security+ certificate with a track towards the CASP (CompTIA Advanced Security Practitioner) certificate....

View Article

Pwn2Own 2017 results

As the second year under Trend Micro’s ownership, the popular hacking event Pwn2Own is celebrating its 10 year anniversary. The targets this year include VMware Workstation, Microsoft Hyper-V, Google...

View Article

‘The Wolf’ commercial by HP lays out the enterprise security risk from...

This is a sponsored post written by me on behalf of HP MPS. All opinions are 100% mine. HP made a very clever series of commercials called ‘The Wolf’. The wolf is the attacker of a corporate...

View Article

Configure a View in Outlook to help prevent falling for phishing

Phishing messages to your work email can be costly if the wrong person replies with confidential information. If you use Outlook for your email client, it can help identify those messages from outside...

View Article


AllRecipes.com announces potential breach

AllRecipes.com is a website for sharing recipes and learning about food. Yesterday, the company emailed out that accounts created before June 2013 may have been intercepted during registration. This...

View Article

There is no welfare when you are below the information security poverty line

The term ‘security poverty line’ was coined back in 2011 by Wendy Nather. It describes organizations who are under-spending on IT security in terms of maintaining an effective level of security or even...

View Article


Dell begins releasing BIOS updates to address Intel AMT Security Advisory

Dell has started releasing BIOS updates to computers affected by the disclosed vulnerability in the Intel AMT framework. Intel’s Active Management Technology, Intel Standard Manageability, and Intel...

View Article

Cyberbullying and Teenagers – Protect Kids Using Mobile Phone Parental Control

Among all the problems that occur due to excessive involvement with social media, cyber-bullying is undoubtedly the most common one. Using mobile devices, “tweens” and teens stay connected to their...

View Article


PSA: Severe Global Ransomware Attack Underway

Once the "Petya" ransomware has infected your system, it encrypts all of your files and displays, on screen, instructions on how you can pay the ransom and regain access to your files. The post PSA:...

View Article

Cloud Security vs. Productivity: Finding the Right Balance

The digital age increased human productivity but also opened up companies to greater security threats. Even a minor data security breach can destroy a company’s reputation, causing it to lose customers...

View Article

Maintaining Security and Privacy in Today’s Online Environment

This is a topic with huge scope so we will break it up into several articles. In this article we will focus on your IP address – the single-most piece of information that ties your internet browsing to...

View Article
Browsing all 109 articles
Browse latest View live