Firewall vs. antivirus: What’s the difference and do you need both?
When it comes to protecting yourself online, there’s a lot of confusion. Between VPNs, two-factor authentication, antivirus software and firewalls, there are so many ways to protect yourself that it can be hard to track them all.
Have an HP computer? These dangerous bugs have been unpatched for a YEAR
A great way to protect your data and personal information from cybercriminals
5 most common antivirus mistakes you should avoid at all costs
Computer viruses are much like real viruses in that an infection can ruin everything.
Stop Trackers Dead: The Best Private Browsers for 2022
Online marketers mine your data and target you for sales. Foil their efforts with the tracking protection and privacy features offered by these secure browsers.
12 Simple Things You Can Do to Be More Secure Online
Follow these easy tips to protect the security of your devices, your data, your internet traffic, and your identity.
Neil J. Rubenking & Jill Duffy
Delete These 35 Malware Apps on Your Android
These 35 malicious Android apps hide their identity on your phone.
How to Get a Secret Phone Number (and Why You Need One)
When you don`t want to hand out your digits, don`t buy a separate phone. Burner apps let you create disposable phone numbers you can even reuse.
Microsoft Defender now better at blocking ransomware on Windows 11
Microsoft has released new Windows 11 builds to the Beta Channel with improved Microsoft Defender
New Android malware apps installed 10 million times from Google Play
A new batch of malicious Android apps filled with adware and malware was found on the Google Play
The Best Identity Theft Protection Software for 2022
Identity monitoring with insurance-backed identity theft remediation offers peace of mind, but it`s best when combined with local security protection for your devices.
Neil J. Rubenking
Is Windows antivirus software still necessary in 2022?
Why Microsoft`s built-in virus scanner is probably good enough (and why you might still look elsewhere).
New MetaMask phishing campaign uses KYC lures to steal passphrases
A new phishing campaign is targeting users on Microsoft 365 while spoofing the popular MetaMask cryptocurrency wallet provider and attempting to steal recovery phrases.
3 tricks to see if your passwords are being sold on the Dark Web
Hackers can make a ton of money by selling your private information on illegal forums.
MetaMask, Phantom warn of flaw that could steal your crypto wallets
MetaMask and Phantom are warning of a new `Demonic` vulnerability that could expose a crypto wallet`s secret recovery phrase
Have a printer at home? 5 critical security steps to keep hackers out
You’ve password-protected your computer, installed antivirus and maybe even checked your home network for intruders. You’re smart! But
6 top network security threats and how to beat them
Here`s a list of the most insidious external security threats and internal vulnerabilities, and how to successfully protect the network against both
Protect your tech: Time to update Chrome, Windows and iOS
One of the easiest ways to protect against security flaws, hacks, bugs and viruses is to keep your software and devices updated.
Over 3.6 million MySQL servers found exposed on the Internet
MySQL servers, 2.3 million are connected over IPv4, with 1.3 million devices over IPv6.
Comprehensive identity protection plus time-tested device security
Neil J. Rubenking
Windows and Mac security settings to check now
`It’s never good to go too long without checking your security settings.