- September 10th, 2015
- No Comments
Online Privacy, Online Safety
Don’t be duped by these security myths.
You probably think that your information is pretty secure.
After all, you tend to use the same old websites over and over, and you downloaded a free antivirus program a while back. And anyway, who would be interested in your information? It’s not as if you have any major secrets or passwords to huge bank accounts in your back pocket, right?
Psssst. Want to know a secret?
Buddy, if that’s how you are approaching security, you’ve got it all wrong. Sure you may not be the IRS or Anthem, but surely you have information that you would never want to fall into the wrong hands. So it’s worth it to make sure you aren’t buying into any of the following common security myths that can get you in a lot of trouble.
Most people choose their pizza toppings according to taste…and rightly so!
If you’re like most people who order pizza, how you choose toppings is pretty intuitive. If you like salty flavors, you opt for olives and anchovies; if you prefer sweet flavors, you choose pineapples and corn. If you’ve got a sense of culinary adventure, a combination of hot peppers, spiced pepperoni and buffalo mozzarella may tickle your fancy. In all cases, choosing pizza toppings is a matter of taste, and there’s no need to take it too seriously, really, since it’s just pizza after all.
Selecting the right antivirus is considerably more important, and should be approached in a more informed manner. After all, this isn’t dinner we’re talking about. It’s your personal computer. It’s your private information, your banking details, your personal email, your family photos, and your confidential files. The decision you make regarding how you protect it should be a sensible one based on facts and research, not your sense of taste.
Hackers look for vulnerabilities that they can exploit.
If you look for the term zero-day attack in your home dictionary, you probably won’t find it.
Go ahead and check…I’ll wait.
You might not even find the term in some online dictionaries (though to be fair, it does appear in others.).
Nevertheless, if you google the term, you’ll find thousands of references to it, many of them from mainstream sources including Forbes, Time, and USA Today. So what’s the deal? If the term is so important, why isn’t in the dictionary yet?
As with so many computer-related terms, the phrase zero-day attack has recently crept into the lexicon of the common person, after being used by technical types for more than a decade. Also known as 0day attacks, zero-hour attacks and 0hour attacks, these are attacks that exploit a vulnerability in a computer application or program.
A vulnerability, by the way, is simply an error in a software that could be exploited. It isn’t a problem in itself, and it isn’t something that stops an application or program from working properly. However, if a vulnerability is discovered by a hacker, and if the hacker uses the vulnerability to conduct nefarious activities, then the moment these nefarious activities are discovered, it is known as a zero-day attack.
- April 16th, 2014
- 5 Comments
Online Privacy, PC security
We’re excited to introduce you to ZoneAlarm Advanced Real-Time Antivirus, a new feature found in ZoneAlarm 2015 security suites*.
It’s recommended that your PC is equipped with, at a minimum, an antivirus, which prevents malware from infecting your PC, and a two-way firewall, which monitors traffic to-and-from your PC. However, with over 315,000 new threats being discovered every single day, it’s simply not practical for the antivirus software on your desktop to update at the same rate without taking a toll on your PC’s performance. With ZoneAlarm Advanced Real-Time Antivirus, you’re protected from the latest Web threats even when the antivirus on your desktop has not yet been updated with the latest signatures.
Continue Reading… Introducing ZoneAlarm Advanced Real-Time Antivirus