Read more about adware
Bookmark and Share
  • Counterclank: Info-stealing Trojan or advertising tool?


    A couple of days ago, Symantec has warned about Counterclank, an Android Trojan that has been unknowingly installed by users on over five million devices.

  • Spyware pushed via Google ads


    By clicking on the link he was taken to the download page of the player, which repeats many times over that the offered player is free.

  • Legitimate apps modified to serve ads and offered on Android Market


    When there's easy money to be had, crooks usually don't care who will end up losing it - and cyber crooks are no exception to that rule.

  • Spyware prevention 101


    Spyware goes by many names, including adware, malware, crimeware, scumware and snoopware, but no matter what you call it, its purpose is still the same: to creep into your computer files and steal your personal information.\r\n\r\nOnce the information is in their hands, hackers can steal your identity, use your credit cards, siphon funds from your bank accounts, and more.\r\n\r\nSimply put: it\'s bad news and you want nothing to do with it.\r\n\r\nThe good news is that spyware prevention is possible and there are many ways to keep these dangerous programs at bay.\r\n\r\nIn addition to installing the right software, consumers can practice these computer security tips from Webroot:\r\n\r\nDownload software directly from the source. Primary common distributor of spyware information infection is free, pirated programs downloaded from file-sharing sites which have been booby-trapped with malware. Set your browser security settings to \"high\" and protect yourself from \"drive-by\" downloads and automatic installations of unwanted programs.\r\n\r\nAvoid questionable websites, such as those featuring adult material. They\'re notorious for spreading spyware threats and causing users problems.\r\n\r\nUse a firewall and be suspicious of email and IM. For instance:Don\'t open attachments unless you know the sender and are expecting a file from him or her.Delete messages you suspect are spam (don\'t even open them).Avoid clicking on links within messages.Do not provide personal information to unsolicited requests even if they seem legitimate.


The role of the cloud in the modern security architecture

Posted on 31 July 2014.  |  Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents into the cloud and discusses how the cloud shaping the modern security architecture.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Fri, Aug 1st