A slow computer can be both frustrating and time consuming, so weâve provided a few basic tips to help give your computer its speed back.
The post How to speed up your computer appeared first on We Live Security.
![]()
ESET
A slow computer can be both frustrating and time consuming, so weâve provided a few basic tips to help give your computer its speed back.
The post How to speed up your computer appeared first on We Live Security.
![]()
Cybercriminals taking advantage of a ‘malvertising’ attack on big name sites including Yahoo!, Match.com and AOL were making in the region of $25,000 per day, according to Forbes.
The post Yahoo, Match and AOL hit by ransomware appeared first on We Live Security.
![]()
Last month, we presented âThe Evolution of Webinjectâ in Seattle at the 24th Virus Bulletin conference. This blog post will go over its key findings and provide links to the various material that has been released in the last few weeks.
The post The Evolution of Webinject appeared first on We Live Security.
![]()
Microsoft is taking aim at traditional single password systems with the upcoming version of Windows, by including build in two-factor authentication according to ZDNet, which describes the move as “audacious plans to tighten security”.
The post Windows 10 to tighten security with prominent 2FA appeared first on We Live Security.
![]()
Make sure you are running a half-decent browser, don’t ignore browser security warnings, and enable two-factor authentication.
That appears to be the lesson to learn from the latest attack on Chinese internet users.
The post iCloud users in China under attack. But who could be after their passwords? appeared first on We Live Security.
![]()
Law makers in Britain are discussing a dramatic increase in sentencing for serious hacking offences, according to The Register. Currently in discussion in the country’s upper house, The House of Lords, the move looks to overhaul the Computer Misuse Act 1990, and includes a possible life sentence for serious hackers.
The post UK takes aim at serious hacking offenses with planned life sentences appeared first on We Live Security.
![]()
Securing your PC isn’t as complex as it first appears. Here’s five tips to help keep your documents safe and threats at bay.
The post Top 5 tips for securing your PC appeared first on We Live Security.
![]()
Google has added an extra layer of security to its browser, by introducing USB authentication to Chrome, the company has announced in an official blog post.
The post Google now offers USB key authentication appeared first on We Live Security.
![]()
Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.
The post Botnet malware: What it is and how to fight it appeared first on We Live Security.
![]()
A proof-of-concept worm that can hunt network attached storage (or NAS) devices has been created by a security researcher. According to Tech World, the worm can target devices created by three different manufacturers.
The post Proof-of-concept worm can attack network attached storage appeared first on We Live Security.
![]()