avatar

About Kirsten Dunlaevy

Kirsten Dunlaevy is a blogger for BullGuard. With a background in advertising and branding she is extremely familiar with the ups and downs of social media and the world of communication. Kirsten is here to educate you on how to navigate all things digital, in a safe and responsible manner. Her other passions are decidedly un-digital, she loves being out on the water and cooking.


Join the March with BeatBullying

Big March BeatbullyingBullGuard is extremely proud to announce a partnership with the anti-bullying charity, BeatBullying. Both real-world and cyber-bullying are real threats that need to be stopped. BeatBullying works hard internationally to do just that, believing that no one should have to endure the pain, fear or isolation of being bullied.

Read more


What is phishing and how to avoid phishing scams

PhishingPhishing is a word we hear a lot of these days, but how many of you actually know what it is?

Phishing is a type of internet fraud, stealing passwords, credit card numbers, and other private and personal information. Typically Phishing attacks come in the form of false notification emails from your bank, and other official organisations that might house your valuable information.

Read more


How to remove toolbars from Internet Explorer (with pictures)

6a0154366bdf49970c01a73d962057970d-800wiSo, you installed some new programs and all of a sudden you see in Internet Explorer new annoying toolbars.

If you’ve got a toolbar that is driving you nuts and you can’t for the life of you figure out how to get rid of it, this article is for you. Many of the toolbars you might have come across, offer no real service except to deliver advertisements, and in some cases, can be malicious.

Read more


Is my computer infected with a virus?

6a0154366bdf49970c01a3fcd7a13e970b-800wiComputer viruses may vary, but they all have one thing in common: they make your life absolutely miserable.

 The specific symptoms and the impact to your computer system all depends on exactly what type of virus your computer is infected with; in fact in some cases your computer may not show any signs at all! In that case, how on earth are you supposed to be able to keep track of your computer’s health?

Read more


US is the Capital of Malware

Computer VirusIn the fourth quarter of 2013, the United States of America hosted 44% of all malware.

That’s almost 5 times more than the second-leading malware-hosting nation: the United Kingdom, who only came in at 10%. That’s quite a lead for the U.S.

So which brands are hosting malware, unintentionally? Amazon is reportedly responsible for 16%, while Go Daddy comes in at a close second with 14%. This data is especially interesting, when you think about how many articles cite Eastern Europe as the culprit. Don’t be fooled – the US is now producing more volumes of malware code than anyone else in the world.

Read more


What’s the Most Secure Web Browser?

World Wide WebWith over 10 popular web browsers out there, how are you supposed to know which will protect you and offer you with the services you need? Well, the good news is you don’t. There’s a lot to consider when looking for a good browser, and BullGuard is here to help you find the right one.

By looking at the browsers and checking for basic features like pop-up blocking, html5 support and private browsing, as well as features like flash, acid test scores and IPv6 support, it was easy to cull a few. And after delving into security and privacy features, only a few were left. But when it was all said and done, our vote is Firefox, without a doubt.

Read more


Rewards for Hackers

Rewards for HackersWe may have found a good purpose for Hackers. Before you go into shock, read on…

The company called Wickr, (for those of you that aren’t familiar with it, it’s a secure messaging app), has reached out to hackers and offered them a reward for doing what they do on a daily basis.

That’s right, hackers are being offered $100,000 to uncover and, here’s the important part, ‘responsibly disclose’ any and all critical security flaws in the company’s app.

Read more


Bluetooth-enabled Skimming Devices

Bluetooth-enabled Skimming DevicesIf you haven’t heard of Bluetooth-enabled skimming devices before, you definitely need to read this article. These devices are being used to steal card information. A recent scam resulted in cyber criminals making off with more than $2 million.

Skimming devices are typically installed inside gas pumps or fixed to ATM’s so that they aren’t detectable by the victims using the machines. By installing Bluetooth-enabled skimming devices, the cyber criminals are making their lives easier – the devices never have to be physically removed, because all of the data can be accessed remotely.
Read more

Plugin by Social Author Bio