Read more about adware
Bookmark and Share
  • Fake Temple Run app found on Android Market

    07.02.2012

    Unfortunately for them, the app doesn't deliver on the promise.

  • Counterclank: Info-stealing Trojan or advertising tool?

    31.01.2012

    A couple of days ago, Symantec has warned about Counterclank, an Android Trojan that has been unknowingly installed by users on over five million devices.

  • Spyware pushed via Google ads

    04.01.2012

    By clicking on the link he was taken to the download page of the player, which repeats many times over that the offered player is free.

  • Legitimate apps modified to serve ads and offered on Android Market

    22.11.2011

    When there's easy money to be had, crooks usually don't care who will end up losing it - and cyber crooks are no exception to that rule.

  • Spyware prevention 101

    21.01.2011

    Spyware goes by many names, including adware, malware, crimeware, scumware and snoopware, but no matter what you call it, its purpose is still the same: to creep into your computer files and steal your personal information.\r\n\r\nOnce the information is in their hands, hackers can steal your identity, use your credit cards, siphon funds from your bank accounts, and more.\r\n\r\nSimply put: it\'s bad news and you want nothing to do with it.\r\n\r\nThe good news is that spyware prevention is possible and there are many ways to keep these dangerous programs at bay.\r\n\r\nIn addition to installing the right software, consumers can practice these computer security tips from Webroot:\r\n\r\nDownload software directly from the source. Primary common distributor of spyware information infection is free, pirated programs downloaded from file-sharing sites which have been booby-trapped with malware. Set your browser security settings to \"high\" and protect yourself from \"drive-by\" downloads and automatic installations of unwanted programs.\r\n\r\nAvoid questionable websites, such as those featuring adult material. They\'re notorious for spreading spyware threats and causing users problems.\r\n\r\nUse a firewall and be suspicious of email and IM. For instance:Don\'t open attachments unless you know the sender and are expecting a file from him or her.Delete messages you suspect are spam (don\'t even open them).Avoid clicking on links within messages.Do not provide personal information to unsolicited requests even if they seem legitimate.




Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //