A Brief Look at the Trojan Horse bho.jew
The Trojan horse bho.jew is a recurring malware that affects Internet Explorer users. The malware redirects to unsafe sites and downloads further …
Continue ReadingThe Trojan horse bho.jew is a recurring malware that affects Internet Explorer users. The malware redirects to unsafe sites and downloads further …
Continue ReadingThere are numerous computer security software suites on the market, but when it comes to your security you should choose only the best. This article …
Continue ReadingThe Autorun.inf worm started off innocently enough, but has evolved to become a recurring pest on a number of USB storage devices. By itself, the worm …
Continue ReadingData security has received attention as recently as the 80s, when it was legally acknowledged that misuse of data constitute great losses for victims. …
Continue ReadingBlocking adverts in your browser is easily achieved, requiring awareness of - and protection from - the two main advert types. Pop-ups and …
Continue ReadingEmails can be used to convey dangerous information as well as vital work-related data. Clever scammers use “mystery emails” to fool users …
Continue ReadingDeleting user-created files from Windows is usually a case of pressing “Delete” - but what if you want to restore the file later, or worse …
Continue ReadingYou’ve probably heard of firewalls before, and know that they are used to protect your computer from certain threats. But what exactly are …
Continue ReadingThe best computer security training should try to cover almost all aspects of computer and network security. This includes the Internet as well. This …
Continue ReadingThis Microsoft Security Essentials comparison takes a look at the features of the latest free antivirus solution from Microsoft when lined up against …
Continue ReadingIT Security training costs vary with the number of trainees and the level of security training. This article looks at IT security at different levels …
Continue ReadingProbably the most insidious malware, keyloggers collect everything you type on your keyboard and make it available to cyber-criminals. This article …
Continue Reading