Read more about adware
Bookmark and Share
  • Fake Temple Run app found on Android Market


    Unfortunately for them, the app doesn't deliver on the promise.

  • Counterclank: Info-stealing Trojan or advertising tool?


    A couple of days ago, Symantec has warned about Counterclank, an Android Trojan that has been unknowingly installed by users on over five million devices.

  • Spyware pushed via Google ads


    By clicking on the link he was taken to the download page of the player, which repeats many times over that the offered player is free.

  • Legitimate apps modified to serve ads and offered on Android Market


    When there's easy money to be had, crooks usually don't care who will end up losing it - and cyber crooks are no exception to that rule.

  • Spyware prevention 101


    Spyware goes by many names, including adware, malware, crimeware, scumware and snoopware, but no matter what you call it, its purpose is still the same: to creep into your computer files and steal your personal information.\r\n\r\nOnce the information is in their hands, hackers can steal your identity, use your credit cards, siphon funds from your bank accounts, and more.\r\n\r\nSimply put: it\'s bad news and you want nothing to do with it.\r\n\r\nThe good news is that spyware prevention is possible and there are many ways to keep these dangerous programs at bay.\r\n\r\nIn addition to installing the right software, consumers can practice these computer security tips from Webroot:\r\n\r\nDownload software directly from the source. Primary common distributor of spyware information infection is free, pirated programs downloaded from file-sharing sites which have been booby-trapped with malware. Set your browser security settings to \"high\" and protect yourself from \"drive-by\" downloads and automatic installations of unwanted programs.\r\n\r\nAvoid questionable websites, such as those featuring adult material. They\'re notorious for spreading spyware threats and causing users problems.\r\n\r\nUse a firewall and be suspicious of email and IM. For instance:Don\'t open attachments unless you know the sender and are expecting a file from him or her.Delete messages you suspect are spam (don\'t even open them).Avoid clicking on links within messages.Do not provide personal information to unsolicited requests even if they seem legitimate.


Staples customers likely the latest victims of credit card breach

Posted on 21 October 2014.  |  Multiple banks say they have identified a pattern of credit and debit card fraud suggesting that several Staples Inc. office supply locations in the Northeastern United States are currently dealing with a data breach.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Wed, Oct 22nd