Items Tagged with threats
#831 / 2010-10-28 09:30:00 / 1:40 min.
A virus hoax is
not a virusbut does pose some
minor threat to the Internet. Because people will send each other
warnings about viruses, an
email about a hoax viruscan spread across the Internet rapidly, slowing things down and
clogging up inboxes.
#826 / 2010-10-21 09:30:00 / 1:20 min.
Here, we explain
what malware isand what it means to your
computer's security. Malware is a
computer termthat is used as a catch-all phrase to describe
malicious software and security threatslike
viruses, spyware, Trojans, wormsand more.
#4 / 2010-04-14 08:00:00 / 3:13 min.
Scanning your computer for threatsis one of the main
features of Spyware Doctor with AntiVirus. Now that you have the program installed and ready to roll, we'll walk you through your first scan and show you what to expect along the way.
#5 / 2010-04-14 08:00:00 / 3:02 min.
Running a scan is only the first step to spyware security. The next step is to
safely remove any spyware or malwarethat the scan might have found. We'll show you
how to remove that malware using Spyware Doctor with AntiVirusand show you how to make sure the selected files are really threats to your system.
#37 / 2009-07-07 10:00:00 / 0:57 min.
Microsoft announced the discovery of a
serious ActiveX threat in Internet Explorer. This threat affects computers running Windows XP and Windows Server 2003. Microsoft responded quickly and created a page where affected users can go to patch the threat.
#2 / 2009-02-10 09:00:00 / 2:49 min.
On the Internet today spyware has become even more of a threat than viruses. For this reason it's important to make sure you're always running Anti-spyware software on your computer. You can run a combination package that contains both anti-virus and Anti-spyware or you can run a separate program for each.
#5 / 2009-01-27 10:26:43 / 2:32 min.
The Downadup/Conficker worm has already infected over 15 million computers in China, India, the United States, England and other countries. The worm affects primarily corporate networks, but personal computer users need to be vigilant. The worm is spread primarily via pirated software and through network connections. Microsoft released a patch that fixed the security flaws, but the infected systems did not apply the patch, often because the copy of Windows is pirated.
iPhone photo-sharing app Instagram was recently the big buzz when Facebook bought it for one billion dollars.
Blogger for Android is a great app for those who use the Blogger service to blog and want to be able to make posts on the go.
Four Android activations every second, iOS pays better and opt-out of targeted ads plus the StumbleUpon app
Every second, 19 blog posts are created, 787 porn searches are enacted, 4.2 babies are born and four Android phones are activated. While Android is tops in activations, it's bested by iOS for developer pay. Also, we'll look at a largely unpublicized way t
Android apps on PlayBook, rooting your Android phone and Acer entering the tablet fray with the Iconia A500
Android apps on PlayBook explained; what they do, what they don't. An always up to date means to root just about any Android phone and Acer entering the tablet fray with the $450 Iconia A500