A Field Guide To Malware In 2016

greycoder-hacker

Malware is used for a wide variety purposes from sleazy business practices to blatant crime. Discussions of malware often mix up the technology of malware and their uses. You will see below that the same technology can be used to direct ads to you that normally you would not see, or steal your credentials to your online banking account. It’s …

6

The Best Privacy-Friendly Apps & Services For 2016

glastile3

This is a guide to privacy-friendly apps and services. These services will help you: reduce your risk of having personal information hacked or leaked block marketing companies from collecting information about you generally avoid surveillance of your activities Search Engines Search engines like Google, Bing and Yahoo record your web searches and link your web searches together. The Solution: Use …

1

Malware: The State Of The Threat In 2016

greycoder-red-blue-masked-cropped

Most malware is acquired when users visit questionable web sites (e.g. adult sites) or when they click on questionable email (e.g. free offers or fake invoices). MS Windows is by far the most vulnerable operating system — but malware exists for Apple OS X and Linux also. You can significantly reduce your risk of a malware attack by keeping your OS, web browser and applications updated diligently.