Security Blog Get Protected
Sections

Industry Latest
5
Security & Privacy
6
Tech-News
7
Tips & Advice
5
TotalAV news
5
Latest Tweets

Tips & Advice
How To Create a Strong Password
Tips & Advice
Why Opening Email Attachments can be Dangerous
Industry Latest
Why Business Cyber Attack Security is Paramount in 2017

Tech-News

Is Trump Still Using an Uprotected Phone In Office?
Last year Donald Trump was criticised for using an unsecure iPhone for presidential business, and not adhering to the correct security protocols to prevent malware infection.   The Washington Post alleged that President Trump has been warned not to use his personal phone in case it is hacked, but he still carries it, and makes […]
8th March 2019

Tech-News

More Accusations of Chinese Spy Chips
Spies based in China have been planting secret chips inside electronics destined for the USA, according to Bloomberg, in a highly coordinated hacking project.   The website reports that tiny microchips appear to have been added to motherboards at the point of manufacture, and those motherboards have ended up in servers in some of the […]
8th March 2019

Tips & Advice

Are Browser Extensions to Blame for Last Years Facebook Hack?
Hackers are selling private messages from 81,000 Facebook accounts online, according to  BBC report.   Facebook claims that there has been no security breach, and says that the messages were probably scraped up by browser extensions that have accessed content during normal browsing sessions.   The BBC reported in November that hackers claim to have […]
8th March 2019

Industry Latest

Cloudfare Ditches Captchas for Tor Users
If you regularly use Tor to ensure your privacy while browsing, you’ve probably noticed that you frequently meet a Cloudflare ‘challenge’ when trying to access certain websites.   Sites that use Cloudflare have been automatically rerouting Tor users to these CAPTCHAs to ensure that traffic is genuine and not malicious.   But for many users, […]
8th March 2019

Tech-News

Hacker Pleads Guilty
By Mark Phillips ¦ Blog.TotalAV.com ¦ Updated 2nd May 2017, 09.11 EDT Mark Vartanyan, who was accused of aiding the development and distribution of malicious software designed to steal financial details, has pleaded guilty on a computer fraud charge. Vartanyan, who used the online alias ‘Kolypto’, was arrested in Norway back in October 2014, and […]
8th March 2019

Industry Latest

Fresh Cyber Attack!
By Mark Phillips ¦ Updated 26th October 2017, 05.12 EDT In what is becoming yet another startling addition to a year plagued by numerous high-profile cyber attacks, Europe has been hit by a new wave of ransomware. The malicious software, which has been branded ‘Bad Rabbit’, follows the same modus operandi of other strains before […]
8th March 2019

Tech-News

Cyber Threat Is Back
By Mark Phillips ¦ Updated 28th June 2017, 05.12 EDT A new major malware attack has started to spread rapidly, crippling major organizations by locking down PCs and holding the data to ransom. Hackers have launched a new strain of ransomware virus, known as ‘Petya’, designed to hijack a victims’ computer by encrypting their files, […]
8th March 2019

Tech-News

New Worldwide Threat
By Mark Phillips ¦ Blog.TotalAV.com ¦ Updated 30th May 2017, 08.16 EDT In yet more harrowing news, a Croatian researcher has discovered a new worm, known as EternalRocks, that utilizes seven stolen hacking tools from the NSA. The malware shares characteristics with WannaCry, and could potentially pose an even greater threat than the already notorious […]
8th March 2019

Security & Privacy

HACKERS STILL ACTIVE
By Mark Phillips ¦ Blog.TotalAV.com ¦ Updated 22nd May 2017, 06.14 EDT The Shadow Brokers, who recently became one of the world’s most notorious cyber attack groups after leaking a stolen hacking tool from the US National Security Agency, is threatening to release even more tools. In a harrowing message, the group raised alarm bells […]
8th March 2019

Tech-News

WORLDWIDE VIRUS HITS
By Mark Phillips ¦ Blog.TotalAV.com ¦ Updated 15th May 2017, 07.31 EDT If any further proof was needed of ransomware’s continual threat in today’s world, it’s now being splashed across international headlines following a mass-scale global attack. Britain is renowned for its top-tier public health service, the NHS, but many of its hospitals have now […]
8th March 2019

Industry Latest

Fake Netflix App Hacks Smartphones
By Mark Phillips ¦ Blog.TotalAV.com ¦ Updated 20th April 2017, 07.31 EDT Like many of the world’s leading streaming services, Netflix has a hugely popular app available to its many users. But hackers have been preying on users who are quick to download and install apps without double-checking for developer authenticity. Cyber security professionals have […]
8th March 2019

Security & Privacy

Gmail Phishing Scam
By Mark Phillips ¦ Blog.TotalAV.com ¦ Updated 25th April 2017, 06.514 EDT Phishing scams have long been plaguing email providers and their millions of users, and Gmail is the latest to take a hit from hackers. Described as one of the most convincing to date, the scam lures unsuspecting users into entering their login information, […]
8th March 2019

Security & Privacy

Ransomware Hits Whatsapp
By Mark Phillips ¦ Blog.TotalAV.com ¦     Android users are being urged to remain vigilant when downloading apps, especially since a new form of ransomware has been discovered. GhostCtrl, a malicious software with the means to secretly record its users, is being spread by disguising itself as popular apps such as WhatsApp and Pokemon […]
19th February 2019

Security & Privacy

Why Business Cyber Attack Security is Paramount
By Mark Phillips ¦ Blog.TotalAV.com ¦ Countless corporations fell victim to cyber attacks last year, a fact made very public by international headlines. Ransomware attacks – essentially malware that holds a system’s data hostage until a ransom is paid – soared to 4000 per day through 2015 to 2016, according to the U.S. Department of […]
19th February 2019

Security & Privacy

Android Apps Sharing Millions of Users’ Private Data
By Mark Phillips ¦ Blog.TotalAV.com ¦ Android apps are utilized by many in our day-to-day lives, but new research has revealed that they are “secretly colluding” to share data without asking for user consent. This sharing could pilot security breaches, leaving contact and location details, among other private information vulnerable. According to researchers at Virginia […]
19th February 2019

Tech-News

Why using a VPN connection is becoming increasingly important?
By Mark Phillips ¦ Blog.TotalAV.com ¦   Even the smallest businesses are reaping the benefits of installing and using virtual private network (VPN) hardware/software. And that’s why using a VPN connection is becoming increasingly important. Why? VPNs can extend a business network to include home-based or mobile workers, so those employees can securely access applications, […]
19th February 2019

Industry Latest

Why is keeping your software up to date important?
By Mark Phillips ¦ Blog.TotalAV.com ¦   Why is this happening again? That pesky pop-up message telling you to update your OS software is staring at you, begging for you to make a choice: “update now” or “remind me later”. What do you do? You choose the ever-tempting “remind me later” option, but we all […]
19th February 2019

Security & Privacy

Yahoo Hacked!
By Mark Phillips ¦ Blog.TotalAV.com ¦   Giants of the internet world have long been victims of hacking, and Yahoo’s breach will come as a distressing headline for millions of its users. The tech corporation, best known for its global search engine, email and other online services, has recently revealed yet more jarring news. Back […]
19th February 2019

Tips & Advice

When Location Tracking Becomes a Risk to Privacy
Location tracking can be a genuinely useful tool. On your phone, it can help to find services close by, or locate the device if you lose it. On a computer, location tracking could help a website deliver more relevant content based on where you live. But how many people have access to this location data? […]
19th February 2019

Tips & Advice

What is two-factor authentication and how can does it help me stay secure online?
By Mark Phillips ¦ Blog.TotalAV.com ¦ One of the best pieces of security advice any computer expert can give you is to enable two-factor authentication where possible. Nowadays, with password breaches being so common, it could be the one thing that keeps away hackers from stealing your online identity. Two-factor authentication or two-step verification? A […]
19th February 2019
Copyright © 2021
Product
Features Software
Explore
Affiliates
Help
Support
Legal
Terms of Service Privacy Policy