7 Ways to Spot a Phishing Scam

Phishing scams_header

It’s early in the morning, and you’ve just made a cup of coffee. You’re checking your email when you see one from PayPal, informing you there is an issue with your account and to ‘click here’ to verify your account. The email even features the official PayPal logo.

Because it’s early and your coffee hasn’t kicked in yet, you might think the email is legitimate and click the embedded link or attachment. And you might end up sorry if you did. If you’d taken a closer look, you’d have realized it was a phishing email.
Continue Reading… 7 Ways to Spot a Phishing Scam

ZeroAccess Botnet: Is It Preparing Its Next Attack?


In December 2013, Microsoft Digital Crimes Unit, Europol, the FBI, and other technology companies sought to take down one of the world’s largest botnets named ZeroAccess (also known as max++ or Sirefef). While the collaboration led to the disruption of ZeroAccess, the takedown was not fully successful as several servers hosting botnet’s command & control (C&C) continued to remain active.

Ever since its discovery several years ago and leading up to 2013, over two million computers globally had been infected. This led to search results from Google, Bing, and Yahoo! being hijacked, which redirected infected users to malicious websites and in turn, impacted the advertising revenue stream on these search providers. In fact, it is estimated that the cost of click fraud, as a result of ZeroAccess, was upwards of $2.7 million each month for online advertisers.
Continue Reading… ZeroAccess Botnet: Is It Preparing Its Next Attack?

Are You Making Yourself a Victim of Cybercrime?

Victim of cybercrime

Did you know some things you do on the Web could actually be putting your PC and personal information in jeopardy? Here are some mistakes and misconceptions that could make you a victim of cybercrime, and what you should do to minimize your risk of becoming part of the statistic.
Continue Reading… Are You Making Yourself a Victim of Cybercrime?

What You Need To Know About Peer-to-Peer File Sharing

P2P sharing on world map

BitTorrent. uTorrent. The Pirate Bay. These are just a few of the many popular peer-to-peer (P2P) file sharing sites you’ve probably heard of. Since its increase in popularity in the late 1990s, P2P file sharing has had its fair share of backlash for enabling illegal activity. Run a Google News search on peer-to-peer file sharing, and you’d find headlines like:

“Barre man charged with promoting child pornography.”

“Is the free download of uTorrent legal?”

“Illegal downloaders in federal court’s crosshairs.”

There’s another aspect to P2P that has traditionally caused concern: computer security and privacy risks. Continue Reading… What You Need To Know About Peer-to-Peer File Sharing

8 Signs Your PC Might Be A Zombie


Zombies are making a killing on TV (The Walking Dead), in movies (World War Z), and in books (Pride and Prejudice and Zombies). There’s even a zombie game/fitness app, Zombies, Run!

But zombies aren’t so entertaining if your computer becomes one.
Continue Reading… 8 Signs Your PC Might Be A Zombie

Secure your entire family

Our Products

ZoneAlarm Extreme Security

Extreme Security

Virus free.
100% Guaranteed.

Learn more
ZoneAlarm Anti Virus

Pro antivirus & firewall

Virus and spyware protection.

Learn more
ZoneAlarm Firewall Pro

Pro Firewall

Blocks hackers and intruders

Learn more

Recent Tweets

Secure your family