We use cookies to ensure that we give you the best experience on our website. By continuing to browse, we are assuming that you have no objection in accepting cookies. You can change your cookie settings at any time.

Close

BullGuard Security Centre

Here we explain technical terms and how different security solutions protect your computer, phone or mobile devices.

Internet Threats

Why do you need online protection? Because the internet is teeming with all sorts of threats.

Some will crash your system. Some will allow criminals to get to your personal information and abuse it to empty your bank accounts or create credit cards and incur debts in your name. While others will lure you down dark online passageways and trick you into handing over the information yourself.

Traditional crimes such as hate crimes, telemarketing, fraud and identity theft, can all become part of the online black market, if they’re committed via internet.



Internet Threats articles

13

februari

2012

BullGuard defends it

It’s subtle. It’s malicious. It’s the man in your browser.  And it’s after your online credentials.... Read more


3

februari

2012

What is browser hijacking?... Read more


18

januari

2012

If you’ve noticed that your computer is slowing down to a crawl lately and for no apparent reason, one of the possible causes comes in the form of malicious internet bots... Read more


9

januari

2012

Spyware is a piece of malware that tricks you into installing it by piggybacking on a piece of desirable software or disguising itself as one – for instance as a “web acc... Read more


5

december

2011

Trade-off between Convenience and Online Privacy

walking around a store, picking up a book and leafing through it. Even if you’d like to buy it, you decide you don’t have the time to read it. So you continue browsing th... Read more


1

november

2010

Identity theft - a very real concern

The dangers posed by malware were a very real concern for computer users long before the internet became commonplace, but while many considered irrecoverable loss of data... Read more


22

oktober

2010

There are a number of options for storing data – the intended purpose deciding which is the most appropriate.... Read more


22

oktober

2010

A botnet or robot network is a group of ‘bots’ or ‘zombie computers’ that run a computer application that is remotely-controlled and manipulated by the owner or the softw... Read more


14

oktober

2010

How do criminals abuse the shopping experience?

Though a handful of front-runners kick-started the online shopping experience in the early nineties, it was Amazon.com that first brought it into the mainstream when it i... Read more


7

oktober

2010

Spam emails

Spam e-mails fall in most countries under privacy and electronic communications laws. Legislation states that organizations must only send marketing e-mails to individual... Read more


Previous Page 2 out of 5 Next



00: 00: 00: 00
Dagen Uren Minuten Seconden
Close