Filing your taxes on April 15? What if someone has already filed “your” income tax return? Sadly, this can happen, and it...
Pamela [Win] It is free to download and allows you to record calls you make using Skype. It works on Windows devices...
Lost you android phone ..? Feeling to sad .. ? Dont worry Now we came with another Application which sorts out...
Common ports, such as TCP port 80 (HTTP), may be locked down — but other ports may get overlooked and be vulnerable...
We all know that sinking feeling when your computer decides to slow down and barely function for no real reason. Why is...
Microsoft will cease providing security updates for the Windows XP operating system on April 8, 2014. If you cannot get away from...
Apple’s Mavericks update was the first free update to Mac OS X – itself a big step forward for security, as all...
Apple’s Mac OS X Mavericks has some very neat privacy features built in - from a “Guest User” account which restricts people...
It seems like every few days there is a new story involving teenaged girls being tricked or blackmailed into sending compromising pictures...
When someone says “data privacy” most people think about the information that is available on sites like Google and Facebook, or stored...
Phishing is unique among cyber attacks - it doesn’t rely on weaknesses in computer software, or new vulnerabilities - it relies, initially...
Over the past two years, many online services have started to offer ‘two-factor authentication’ - an extra security measure which often requires...
‘Adware’, software which delivers unwanted adverts, isn't as scary as some malware, but ESET's analysis of Win32/Boaxxe shows that 'malicious' adware is...
Read how to protect yourself if you've been shopping with credit or debit cards (and who hasn't?). As the scope of the...
Target's 2013 data breach is expanding in scope and scale, requiring additional vigilance on the part of shoppers to protect their accounts...
ESET’s Threat Trends Predictions report for 2014 found new Android malware increased 63% from 2012 to 2013 - so If you’re a...
Tips for shoppers worried that their credit or debit cards may have been compromised by the massive security breach at Target stores.
we provide more detail on the most exploited applications and advise a few steps users can (and should) take to further strengthen...
Have you checked out the weekly podcast by ESET security researchers? It's called the ESET Malware Report and it covers many security...
For years, "encryption" has sounded like James Bond technology to many PC users - but new systems have made "crypto" technology easier...
Information security policy can make a big difference for small business. Here we offer advice, resources, and a free recorded webinar on...