Capsule. Your solution to mobile privacy.

ZoneAlarm lets you know which apps are tracking you

Capsule comes with 5 Protections, and lets you know which apps are tracking you

Capsule is ZoneAlarm’s powerful mobile security product, designed to provide you with privacy and security on your Android device, especially on public WiFi.

The world is moving to mobile, but the world of mobile threats is expanding every day. Apps that track you, hackers that eavesdrop on your communications, and app vulnerabilities that can expose your device to criminals are just some of the issues that threaten privacy on your mobile device. ZoneAlarm Capsule is designed to protect you from all these threats, so you can regain your privacy.

We talked with Uri Braun, one of ZoneAlarm Capsule’s R&D Managers, to learn more about how ZoneAlarm Capsule protects people’s privacy and security on their mobile device. Read more…


The Airport Hack That Could Have Happened Anywhere

Planes were grounded at Warsaw's Chopin Airport due to a hack.

A hack caused planes to be grounded at Warsaw’s Chopin Airport for 5 hours.

There was no shortage of major security stories last week, ranging from the Samsung vulnerability that affects some 600 million users to continuing coverage of the leak at the US Government’s Office of Personnel Management. That leak, by the way, now seems to have affected as many as 18 million people, including former, current and prospective federal government.

Read more…


What the Heck are Zero-Day Attacks? (And 3 Ways to Avoid Them)

Hackers look for vulnerabilities that they can exploit.

Hackers look for vulnerabilities that they can exploit.

 

If you look for the term zero-day attack in your home dictionary, you probably won’t find it.

Go ahead and check…I’ll wait.

You might not even find the term in some online dictionaries (though to be fair, it does appear in others.).

Nevertheless, if you google the term, you’ll find thousands of references to it, many of them from mainstream sources including Forbes, Time, and USA Today. So what’s the deal? If the term is so important, why isn’t in the dictionary yet?

As with so many computer-related terms, the phrase zero-day attack has recently crept into the lexicon of the common person, after being used by technical types for more than a decade. Also known as 0day attacks, zero-hour attacks and 0hour attacks, these are attacks that exploit a vulnerability in a computer application or program.

A vulnerability, by the way, is simply an error in a software that could be exploited. It isn’t a problem in itself, and it isn’t something that stops an application or program from working properly. However, if a vulnerability is discovered by a hacker, and if the hacker uses the vulnerability to conduct nefarious activities, then the moment these nefarious activities are discovered, it is known as a zero-day attack.

 

 

 

Read more…


Credit Card Breaches Happen: What You Can Do to Protect Yourself

CREDIT CARD BREACH 2_header

Target, The Home Depot, and Kmart are just a few companies that were hit by a recent credit card breach. And the undeniable truth is it’s only a matter of time before another company makes headline news.

With the holiday season just around the corner, finding the perfect gift is on the minds of many consumers. In spite of the massive credit card breaches that have happened this year, a recent study by Deloitte found that while 42 percent of consumers are concerned about their personal data when making in-store purchases, 56 percent will still shop at retailers that have experienced a data breach. What this implies is that many consumers have accepted credit card breaches to be the norm.

Continue Reading… Credit Card Breaches Happen: What You Can Do to Protect Yourself


Why You Should Take Your Passwords Seriously

What's the strength of your passwords_header
Unfamiliar messages. Passwords that no longer work. These are just two of the many clues that cybercriminals have gotten a hold of your password and broken into your account.

With the password compromised, the first step is to regain control over the account by changing passwords and checking configuration settings to make sure nothing has changed. However, if the root problem (how the passwords were successfully stolen) is not fixed, then the accounts will just get compromised again and again. That’s why it’s important to take your passwords seriously and to make sure they are strong.
Continue Reading… Why You Should Take Your Passwords Seriously


Recent Tweets