How Old Online Scams Still Make Victims

Latest scams blog“Con games,” “Scam,” “Stratagem (deception),” and “Confidence trick” are all terms used to express the attempt to defraud a person after first gaining their confidence. Fraud, in all its forms, has been a very difficult issue to deal with for all countries over the years. And since the internet has become a sort of a big, free and easy to access social network in itself, cybercrooks can easily leverage its perks in order to distribute malicious software and all kinds of scams.

Read more

Online Security Tips For A Safe Spring Break

Spring break safety_blogSpring is upon us, and that means it’s time to start baring those legs and shoulders. It’s also time for BullGuard to share with you some spring break safety and security tips. These tips are especially important to take note of if you plan on taking a Spring Break. So here we go:


Read more

Have You Heard Of Longline Phishing?

Longlining phishing_blogA recent study showed that out of one billion email messages analyzed in a six-month period, dozens had been subject to “longline” phishing attacks. These attacks were so efficient that over 10% of the recipients were tricked into clicking on malicious content capable of taking complete control of PCs and compromising corporate networks.

Read more

What You Need To Know About Passwords

Strong passwords_blogWith all the hacks we’ve been hearing about lately, the need for stronger and unique passwords has become more stringent than ever. Good thing researchers are constantly seeking new ways to enhance the safety and ease of use of online authentication systems. It is possible that in a not so distant future we may even be able to authenticate using pass thoughts instead of passwords.

Read more

Is North Korea Training Hackers?

North Korea training hackers_blogUnless you live under a rock, you’ve no doubt heard about North Korea’s recent threats of a missile launch. Unfortunately, that’s not their only form of attack. A few weeks ago, South Korea experienced a synchronized cyberattack, but investigators have yet to identify the culprit. Of course, the number one suspect is North Korea.

How Fake Adobe Flash Updates Put Your Security At Risk

Fake adobe flash player update_blogSecurity researchers have recently discovered a new Android Trojan that can harvest a victim’s contact list, send and intercept SMS (text) messages, make phone calls (including calls to premium numbers), and install additional malware packages – all at the same time.


Read more