ALL POSTS Gamers Targeted with Fake In-Game Comms Apps Christopher Boyd February 5, 2015 0 Comments Playing games online with your friends can lead to frustration where teamwork and coordination are concerned – if you’re not paired… Logging In and Captcha Pieter Arntz February 4, 2015 0 Comments What is Captcha?CAPTCHA (“Completely Automated Public Turing test to tell Computers and Humans Apart”) is one of the annoyances that we… HanJuan EK fires third Flash Player 0day Malwarebytes Labs February 3, 2015 0 Comments A new Adobe Flash zero-day, the third one this year so far, has been found in the wild via drive-by download… Google Chrome update Spam drops CTB Locker/Critroni Ransomware Jérôme Segura February 2, 2015 0 Comments Beware of emails appearing to come from Google warning you that “Your version of Google Chrome is potentially vulnerable and out… 10 tips to maintain an online presence in a privacy-hostile world Jérôme Segura February 2, 2015 0 Comments Online privacy is such a hot topic these days due in large part to the recent revelations about the NSA which… Safe Practices with Your Mobile Device Nathan Collier February 1, 2015 0 Comments After weeks of tortuous waiting to get your new Android device, it’s finally here!You immediately plug it in, power it up, and… Hardening Firefox Jean Taggart January 31, 2015 0 Comments In this post, we will explore some techniques, methods, and tools to increase the security stance of the Firefox web Browser.Don’t… The Password and You Joshua Cannell January 30, 2015 0 Comments Everyone who uses a computer knows the importance of passwords.In several ways, these small textual nuggets have become the keys to… Keeping a Secure Mobile Device Armando Orozco January 29, 2015 0 Comments Keeping your mobile device free of malware is an important side of securing your data and privacy. The other side is… Previous 1 … 540 541 542 543 544 … 618 Next Contributors Threat Center Podcast Glossary Scams