Antivirus Blog and Resources

Featured Posts

6 Ways to Stay Safe Online

August 18, 2017

In the last several years cyber security has become a major issue, not only for major stores like Home Depot, Target, a...

Read More
Never Put These Docs in Your Wallet

May 17, 2016

Yes, believe it or not, you CAN get by in life with a wallet that just has a little cash, a store card or two, one to tw...

Read More
Google Alert Scams

May 10, 2016

If you want to know the latest on "any topic," just sign up for Google Alerts. Google will e-mail you notifications of n...

Read More

All Posts

  • Generic placeholder image
    Bank Account Depleted, Company Sues
    Is it Bank of America's fault that a hospital was hacked and lost over a million dollars? Chelan County Hospital No. 1 certainly thinks so, reports an article on krebsonsecurity.com. In 2013, the payroll accounts of the Wash...
  • Generic placeholder image
    1 Billion Records Hacked
    Billions and billions. It's only a matter of time before this becomes the number of hacking incidents in a single year, because just in 2014, over one billion records were hacked out of 1,500 different hacking incidents, say...
  • Generic placeholder image
    Everyone is Vulnerable to Attack
    There's the war on drugs, the war on terrorism, the war on cancer and the war on cyber threats. In fact, more people are vulnerable to cyber attacks than they are to the first three threats combined. So pervasive is this thr...
  • Generic placeholder image
    Attention Lenovo PC Owners: Something’s Fishy With Your Computer
    Does your Lenovo computer have Superfish VisualDiscovery adware (a.k.a. spyware) installed? It's possible if you purchased a Lenovo PC any time in September of 2014 and thereafter. This Superfish software intercepts the Leno...
  • Generic placeholder image
    HTTP2 is the New Web Security 2.0
    Ever wonder what HTTP stands for? Hypertext transfer protocol. Here is the actual definition in tech terms: "The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborativ...
  • Generic placeholder image
    Sad Scary State of Bank Security
    Who needs guns, threatening notes to rob a bank when you can do it with just your fingertips inside your home? A hacking ring in the eastern portion of Europe may be the most successful team of bank robbers to date, having pu...
  • Generic placeholder image
    What Happens When a Bank Account is Hacked?
    Who'd ever think that 50 years ago, your money was safer in your bank account than it is today in this "modern" age: remote theft. If you bank with a large or small bank, your account may be at risk by hacking rings. However...
  • Generic placeholder image
    Microsoft and McAfee Can Remove Superfish Adware
    Mashable reports that both Windows Defender and McAfee antivirus software have been updated to remove Superfish Adware. Superfish is an adware product preinstalled on new Lenovo Windows laptops that has a security vulne...
  • Generic placeholder image
    How to Build up or Rebuild Your Credit
    No matter how responsible you are with your money, you won't get a loan if there's no evidence of this. The evidence comes from having credit. You need to show lenders you can be trusted. Every time you apply for a credit ca...
  • Generic placeholder image
    Fixing a Credit Report After Being Hacked
    First off, how NOT to fix a hacked credit report: signing on with a service that promises to correct the problem in a jiffy-a "sounds too good to be true" advertisement. A company that claims they will 100% fix your bad credi...

Compare the top ranked companies

Find the right company for you.

AVG image #1
McAfee image #2
Norton LifeLock image #3
Intrusta image #4
BullGuard image #5
VIPRE image #6 View
More