The modern malware landscape is huge, and it’s growing more and more sophisticated every day. In one of our previous blog posts, we discussed the different types of malware, their infection mechanisms and how they act within a system. Currently, there is one category of malware that is becoming increasingly more popular called “ransomware.” In this blog post, we will discuss what ransomware is and what strategies and techniques are used in creating and propagating this latest trend in internet crime.
Continue reading “All You Need To Know About Ransomware”
Over the past few decades, computer security has become an important concern among users. Security vendors have faced tremendous challenges dealing with complex security threats with IT experts placing more effort on educating people. Nevertheless, there are many computer security myths that exist today and surprisingly, many people still believe them. In this blog post, we'll reveal a few of the most common malware myths and the misconceptions that can put you at risk.
Continue reading “6 Common Myths and Misconceptions About Malware”
In today’s world of ever-increasing digital crimes, cyber-attacks, and Internet frauds, there is nothing more important than protecting your online accounts and identity. We have been using “Username” and “Password” as an integral part of computer security systems from the beginning, but they are no longer enough to thwart cybercriminals. In order to provide us better security against cyber-attacks, a new form of authentication called “two-factor authentication” (2FA) is being used by several major tech players and banks, and many others are in process of implementing it as well.
Continue reading “Two Factor Authentication – What’s It All About?”
When we talk about network security, security risks associated with routers is a major concern among users. A router, whether it’s wired or wireless, is an integral part of any home or business network. However, wireless routers or Wi-Fi routers are considered to be less secure than wired ones, but that doesn’t necessarily mean you should avoid wireless networks. In fact, wireless networks have many advantages over wired networks. If your wireless router is configured correctly, it can be virtually as secure as a wired setup.
Continue reading “Why Wireless Router/Gateway Security Is So Important As Part Of Your Security System”
In today's increasingly technology-driven world, the Internet plays a large role in spreading information. There are however things that people need to be aware of when using the Internet, such as cybercriminals, who misuse the Internet to carry out their criminal phishing attacks. They set out to deceive users into revealing their sensitive information unknowingly which can result in substantial financial loss.
Phishing attacks are one of the most serious problems that users face on the Internet and has been growing at an alarming rate. According to a reportpublished by EMC Corporation, the total number of phishing attacks launched in 2012 was 59% higher than in 2011.The global financial loss from phishing attacks is estimated to be around $1.5 billion in 2012, representing a 22% increase from 2011.
Continue reading “How to be Safe from Phishing”
Back in January of this year, the United States Department of Homeland Security advised PC users to disable Java from their web browsers following the serious zero-day vulnerabilities discovered in Java. In response, Oracle released an emergency Java patch, but the fix was not meant to patch all the critical vulnerabilities.
Staying protected against Java exploits is a rising concern among millions of Windows®, Mac OS®, and Linux® users. What makes this exploit such a big deal is the fact that Java runs on more than 850 million personal computers and on billions of devices worldwide, including mobile devices and TVs1.
Continue reading “Is It Time To Disable Java™?”
Many PC users consider malware, viruses, spyware, adware, worms, Trojans, etc. as the same thing. While all these infections harm our computers, they are not the same. They are all types of malicious software that each behave differently.
Continue reading “Malware, Spyware, Virus, Worm, etc… What’s the Difference?”
We are excited to announce today that we’ve been acquired by Support.com, a leading provider of cloud-based services and software that help make technology just work for consumers and small businesses. We’ve had many offers in the past, but this one really made sense. Like us, Support.com is dedicated to helping people in their small businesses and at home get the most out of their technology.
By joining the Support.com team, we can protect even more people with SUPERAntiSpyware. The whole team at SUPERAntiSpyware will be joining Support.com, including our founder Nick Skrepetos. Sure, some things will change as they always do, but one thing that won’t change is our dedication to our customers and to removing ALL the spyware, NOT just the easy ones! For more information about the acquisition, click here!
MySecurityShield is a new/updated rogue. This is yet another variant being distributed as of today. We have updated our definitions to detect and remove all traces of this rogue.
Click here to download SUPERAntiSpyware to Remove MySecurityShield
GoodMemory is a new/updated rogue. This is yet another variant being distributed as of today. We have updated our definitions to detect and remove all traces of this rogue.
Click here to download SUPERAntiSpyware to Remove GoodMemory