News

The new phenomenon of cyber attackers – IT staff blackmailing

March 23, 2012  Security Suite

The process is quite simple, a group or an individual person choose a goal and to try to get as much general information as possible about the employee or members of his family. The sources of this information are mostly social networks. Social networks nowadays highly facilitate social engineering, and the target can be easily bribed, deceived or blackmailed. The most common targets are just IT managers of large companies who are very active on the Internet, and usually their family members are as well. We recommend following the basic rules of safe behavior on the Internet and social networks.

Back to News Archive

News of the Month

Stagefright - probably the most dangerous threat to smartphones right now

August 25, 2015  Security Suite

Can you imagine a single received MMS could allow hackers to access all your data on your phone? Meet Stagegright, the exploit that is a threat for 950 million smartphones with Android. Vulnerability like this is very dangerous because it does not require any action by the victim - all the hacker needs to compromise your smarthphone is your phone number.

Product Help

Go to our Help section quickly find solutions for issues you may be having with our products.

Full IT Glossary

Look up technical terms in our extensive glossary! Use this as a reference tool and read informative, easy to understand definitions.

Visit IT Glossary

GetMsg("In_the_spotlight")

Spyware Terminator 2015

GetMsg("Effectively_remove_spyware_from_your_PC")

GetMsg("Learn_more")