News — cyber security

Are Free Antivirus Apps for your Android phone trustworthy?

antivirus Antivirus Software cyber crime protection cyber security cyber-criminals cyberhabits data breach data protection devices Internet security Software malware privacy protection ransomware security smartphones spying spyware

Are Free Antivirus Apps for your Android phone trustworthy?

Recent research suggests it might not be! As with any installation of any apps we should be vigilant always, even if they are coming from a trusted source like Google Play Store. But recent reports have uncovered worries about FREE antivirus and ‘cleaning up’ Apps, so while you think you are protecting your phone from Malware and other cyber infiltration, this might not be true. Many of these free apps can contain links to malicious sites and contain trackers, so it’s doing the exact thing you are trying to avoid by downloading in the first place! In-depth research has discovered...

Read more →


UNSURE WHAT PROTECTION YOU NEED?

antivirus Antivirus Software bank accounts cloud cyber attack cyber crime protection cyber security cyber-criminals Dark web data protection databackup devices hackers infections Internet security Software malware parentalcontrol password manager pcsecurity phishing privacy protection ransomware security

UNSURE WHAT PROTECTION YOU NEED?

Something we don’t really want to think about while we are happily browsing the internet, or doing our shopping or banking, is ‘am I protected against cyber criminals? & if not, what is my best protection? A virus is one of the least worrying thing now that are devices can attract, we now have numerous other worries that can infiltrate our devices like Spyware, Malware and Ransomware to name just a few. Last year, globally, there were 850 million victims of cyber-crime, someone in the world falls foul to Identity theft every 2 seconds! But as Cyber-Crime evolves, so does Antivirus...

Read more →


Want your PC to run like new again? Has it turned from a Hare to a Tortoise?

antivirus Antivirus Software cyber security Dark web data protection datawipe hackers home devices home systems Internet security Software Norton 360 Norton Antivirus Software privacy protection speed

Want your PC to run like new again? Has it turned from a Hare to a Tortoise?

There is nothing more niggling and annoying than having a PC that is very sluggish and slow. With Norton Utilities Ultimate it can optimize your processing power, memory, and hard drive automatically behind the scenes while your PC is idle, cleaning, repairing, and removing clutter. Common issues and problems can be fixed, and it can free up space, so you get faster access to your programs. Most of us keep our personal files on our PC, and in an era where personal information is the world’s highest saleable commodity, Norton Utilities Ultimate cleans out your internet files to improve your...

Read more →


Ransomware won't happen to me! or will it?

Antivirus Software backup bank accounts cyber attack cyber security cyber-criminals data protection databackup hackers Internet security Software phishing ransomware

Ransomware won't happen to me! or will it?

This is a word we probably have all heard of, but assume it applies only to large business’s /companies, this is not strictly true. As our world becomes more reliant on ‘online’ life, we are venerable to these infiltrations. But what is it? Let’s start with the basics.   Ransomware is malware that employs encryption to hold a victim’s information at ransom. The hacker uses it to encrypt a user or organization’s critical data so that they cannot access files, databases, or applications. A ransom is then demanded to provide access. It is a growing threat, generating billions in payments to cybercriminals and inflicting...

Read more →


Start the New Year right!

Antivirus Software Credential stuffing cyber attack cyber crime protection cyber security cyber-criminals cybercriminals Dark web data breach data protection Hacking Norton 360 security security breach

Start the New Year right!

Have you heard the phase ’Credential stuffing’? No? well this is a method that cybercriminals use to infiltrate and breach systems, anything from PayPal, Netflix, Amazon, the list is endless. The cyberattacker has lists of compromised users account details i.e sign in details/passwords. There will be hundreds of thousands of stolen identities on the lists, gained from places like the Dark web. The attackers will then use these lists using special software & powerful computers to work at cyber speed, processing the stolen I Ds against thousands of Online services. It’s a game of chance, but with the number of...

Read more →