News — security

Beware of some malicious ‘camouflaged’ Android Apps !

Antivirus Software App controls devices infomation malware mobile apps protection security

Beware of some malicious ‘camouflaged’ Android Apps !

A new batch of malicious Android apps filled with adware and malware was found on the Google Play Store that have been installed close to 10 million times on mobile devices. The Apps in question, pose as image-editing tools, virtual keyboards, system optimizers, wallpaper changers, plus more.  Their main function being to push Ads, subscribe users to premium services, and steal victims' social media accounts. Google are aware and have removed the vast majority of these malicious applications, however, if you have installed any of these prior to their removal, its best to uninstall them and run an AV scan to...

Read more →


Smishing? Don't get fooled by the Chameleon!!

Antivirus Software bank accounts cyber security cyber-criminals cybercriminals data protection fake ads hackers infomation password manager passwords pcsecurity phishing privacy scams security Smishing

Smishing? Don't get fooled by the Chameleon!!

Don’t let the Chameleon fraudsters trick you! You’ve probably already heard about Don’t let the Chameleon trick you!You’ve probably already heard about phishing emails, what they look like and what to avoid. Well, SMS phishing – or smishing, is the text equivalent. What do they look like and what should you do if you get one? Don’t let the Chameleon trick you! Check out what to look for below.What is Smishing? You’ve probably already heard about phishing emails, what they look like and what to avoid. Well, SMS phishing – or smishing, is the text equivalent. What do they look...

Read more →


Are Free Antivirus Apps for your Android phone trustworthy?

antivirus Antivirus Software cyber crime protection cyber security cyber-criminals cyberhabits data breach data protection devices Internet security Software malware privacy protection ransomware security smartphones spying spyware

Are Free Antivirus Apps for your Android phone trustworthy?

Recent research suggests it might not be! As with any installation of any apps we should be vigilant always, even if they are coming from a trusted source like Google Play Store. But recent reports have uncovered worries about FREE antivirus and ‘cleaning up’ Apps, so while you think you are protecting your phone from Malware and other cyber infiltration, this might not be true. Many of these free apps can contain links to malicious sites and contain trackers, so it’s doing the exact thing you are trying to avoid by downloading in the first place! In-depth research has discovered...

Read more →


UNSURE WHAT PROTECTION YOU NEED?

antivirus Antivirus Software bank accounts cloud cyber attack cyber crime protection cyber security cyber-criminals Dark web data protection databackup devices hackers infections Internet security Software malware parentalcontrol password manager pcsecurity phishing privacy protection ransomware security

UNSURE WHAT PROTECTION YOU NEED?

Something we don’t really want to think about while we are happily browsing the internet, or doing our shopping or banking, is ‘am I protected against cyber criminals? & if not, what is my best protection? A virus is one of the least worrying thing now that are devices can attract, we now have numerous other worries that can infiltrate our devices like Spyware, Malware and Ransomware to name just a few. Last year, globally, there were 850 million victims of cyber-crime, someone in the world falls foul to Identity theft every 2 seconds! But as Cyber-Crime evolves, so does Antivirus...

Read more →


Start the New Year right!

Antivirus Software Credential stuffing cyber attack cyber crime protection cyber security cyber-criminals cybercriminals Dark web data breach data protection Hacking Norton 360 security security breach

Start the New Year right!

Have you heard the phase ’Credential stuffing’? No? well this is a method that cybercriminals use to infiltrate and breach systems, anything from PayPal, Netflix, Amazon, the list is endless. The cyberattacker has lists of compromised users account details i.e sign in details/passwords. There will be hundreds of thousands of stolen identities on the lists, gained from places like the Dark web. The attackers will then use these lists using special software & powerful computers to work at cyber speed, processing the stolen I Ds against thousands of Online services. It’s a game of chance, but with the number of...

Read more →