Archives - Malware


Don’t trust free versions of antivirus software to keep you safe

Free trials are great ways to learn about an antivirus suite’s features before purchasing it. However, you shouldn’t count on a trial version to keep you safe – it’s meant to be a purchase aide, not a comprehensive defense against malware. Be sure you upgrade to a full version to stay safeguarded.

Don’t side load apps

Side-loading is the practice of downloading applications that have not been sanctioned by the operating system’s official app store. It’s ordinarily not worth the risk, as there’s no guarantee these apps have been scanned for malware. Best to only use the official channels.

What’s a Zero-Day Attack?

A zero-day (also known as 0-day) vulnerability is a computer-software vulnerability that is unidentified to those who would be interested in mitigating the vulnerability (including the vendor of the target software). Until the vulnerability is ended, hackers can exploit it to adversely affect computer programs, data, additional computers or a network. An exploit focused at […]

Beware of large ‘download’ buttons

As a golden rule, the bigger a download button is, the more it’s trying to get your attention – which overcompensates for the fact you may see something suspicious on the rest of the webpage. This is prevalent on file hosting services: You click on them to find a movie, video, song or live stream, […]

Don’t ever open unsolicited email attachments

Email attachments are risky. They might contain malware, or be so large that they eat up too much space in your inbox. The best approach is to not open them and delete them, unless they come from a trusted sender. Encourage your contacts to share via cloud links instead.

Only do business with trustworthy online sellers

Before providing any personal or financial information, make sure that you are interacting with a reputable, established vendor. Some attackers may try to trick you by creating malicious websites that appear to be legitimate, so you should verify the legitimacy before supplying any information. Attackers may obtain a site certificate for a malicious website to […]