BullGuard’s Security Predictions for 2013

Security predictions_blogSome weeks ago we were talking about what security lessons we’ve learned from 2012’s tumultuous malware and hack attacks. But with devices such as smartphones and tablets becoming ever more prevalent, cybercrooks are on the lookout for new ways to steal data, and with many users slow to adopt security measures for their new devices, it’s more important than ever to be aware of the nature of new threats.

Software Vulnerabilities Part II: Computer Weaknesses Threaten Your Internet Security

Computer vulnerability -blogRecently, we talked about some vulnerabilities in mobile apps that could put mobile users’ security at risk. Now, critical vulnerabilities discovered over the past few weeks in widely used software, such as Java 7 and Microsoft’s browser Internet Explorer, urge us to focus our attention on weaknesses in computer software.


Read more

How To Identify And Steer Clear Of SMS Spam & Scams

How to identify SMS scams_blogYou’ve probably received one – if you didn’t know what it was you were probably confused, and if you did know what it was you were more than likely, pretty annoyed. Text messaging scams are actually a type of spam, in other words unwanted contact or content sent to you via your electronic device without your consent.


Read more

Mobile DDoS Attacks On Android

DDoS attacks on Android - mobile security_blogHave you heard of the distributed denial-of-service attack (DDoS attack)? Either way, you need to keep reading – it’s important you are educated on this threat targeting both PCs and mobile devices!

Because of their complexity and the fact that these DDoS attacks require more than one cybercriminal to carry them out, they are typically targeted at high-profile web servers, such as bank servers. The goal of the attack itself is to make the machine or network unavailable to its users, and this is accomplished by overloading the server with requests and traffic, thus causing the site to become painfully slow or unavailable.

Read more

BullGuard Speeds Up and Optimizes Your PC

Pctuneup_blogIs your PC running a bit slower than usual? Did you run a virus scan but no malware threats were found? Well, it might just be all those program leftovers taking up memory space or some default settings of applications you’ve installed that don’t quite see eye to eye with your PC’s capabilities. What to do? Instead of going through all the system files yourself to look for issues that may have caused the slowdown, you might consider using a PC Tune Up tool to automatically scan your PC and optimize its performance. Just as your car needs a tune-up every now and then, so does your computer.

Read more

Aspiring Hackers?

Aspiring hackers_blogHacking a site or a database takes a decent amount of skill and a lot of man hours, as you can imagine. But, there’s a new breed of hacker that isn’t as skilled… we’ll call them “aspiring hackers”. Instead of spending their days cracking code, they’re simply using premade hacking tools developed by more advanced hackers.

Interestingly enough, some of the stories you’ve read about hacking, were done by these aspiring hackers and their tools.

Read more

Top 4 Identity Threats In 2013

Identity theft 2013_blogIdentity Theft is a hot topic as we enter 2013. Hackers are developing more ways to steal identities, and it’s only getting easier for them. According to Time Magazine, 2.5 million dead people get their identities stolen every year. We are all at risk, and yet most do very little to protect themselves and their data.

So, what are the areas that BullGuard anticipates seeing the biggest increase in identity theft this year? Have a read below, and learn how to protect yourself against…

Read more

Does Facebook’s Graph Search Make You An Easy Target To Scammers?

Facebook Graph Search_blogLast week, Facebook announced its latest functionality: the Facebook Graph Search. As Facebook changes its look and functionalities often, you’ve probably asked yourself: “Ok, what is Facebook doing now?” In a nutshell, Facebook tries to follow in Google’s footsteps to create a built-in search engine that allows you to find things and… PEOPLE, more easily, based on relationship and context. Surely, all you Facebook groupies can’t wait to test it out, but cybercrooks can’t either. How’s that? Well, let’s dig a bit deeper, shall we?

Read more

New Type Of Highly Targeted Phishing Attacks: Bouncer Phishing

Bouncer phishing_blogNot only are phishing attacks increasing exponentially, but they are also becoming more and more advanced and more targeted. The latest discovered by researchers is known as “Bouncer List Phishing”. Unlike most bouncer lists, this is one list you really don’t want to be on!

Bouncer Phishing attacks a pre-determined email list, and each user on the list is sent a unique URL providing them with access to the attack. Once the link is clicked on (never click on a suspicious link!), the victim is sent to a phishing page designed to steal private information, such as credentials.

Read more

What’s “Internet Trolling” And How Can It Affect You?

Internet_trolling_blogRemember we’ve talked about how to become a better online citizen?

 Now make a U-turn and think of… TROLLS. The anti-social side of being social. A threat to good manners and Internet etiquette. Trolling is all about deliberately and cleverly annoying people online and there are plenty of examples. To spot a troll in your online conversations on forums, blogs or chat rooms simply look for offensive or off-topic messages that disrupt the thread and try to start a riot!

Read more