Our latest blog posts

What Is Spoofing? And How to Mitigate an Under-the-Radar Threat
What Is Spoofing? And How to Mitigate an Under-the-Radar Threat

In 2017, a man was arrested for stealing $100 million from two tech companies by launching an elaborate cyber attack. He didn’t use ransomware. And he didn’t use some kind of advanced, zero-day malware.

The attacker took an approach that typically gets less attention than the latest and greatest threats — it’s known as spoofing.

Joe Michalowski by Joe Michalowski March 24, 2019
What Is a Computer Worm? Tips to Protect Your PC in 2019
What Is a Computer Worm? Tips to Protect Your PC in 2019

There are dozens of different kinds of malware: viruses, Trojans, bots, ransomware, and plenty more. All of them can wreak absolute havoc on your computer if you’re not protected.

One of the most nefarious of the bunch is the class of malware known as computer worms.

Evan Porter by Evan Porter March 19, 2019
Interview With Andy Mallinger – Webroot
Interview With Andy Mallinger – Webroot

Safety Detective’s Aviva Zacks had the chance to interview Webroot’s Senior Director of Product, Andy Mallinger, and took it! Here are his thoughts on phishing and how Webroot is helping protect consumers and small businesses from cyberattacks.

Aviva Zacks by Aviva Zacks March 17, 2019
Interview With Dean Mekkaway – Sophos
Interview With Dean Mekkaway – Sophos

Safety Detective had the pleasure of interviewing Sophos Product Manager Dean Mekkaway, who helped us understand how SophosLabs stays at the forefront of cybersecurity.

Aviva Zacks by Aviva Zacks March 14, 2019
Which is the most Secure Web Browser to Use in 2019?
Which is the most Secure Web Browser to Use in 2019?

We’ve written extensively on the various attacks that your computer can experience simply by browsing the internet. If you type in the wrong address on your browser, you can get hit by a man-in-the-middle attack. Download the wrong file, and suddenly your browser, homepage, and ads all look different.

Andrew Sanders by Andrew Sanders March 13, 2019
Keyloggers Used to Spy on Everything You Write - How to Remove in 2019
Keyloggers Used to Spy on Everything You Write - How to Remove in 2019

Imagine that someone in your computer could see everything you write. Hackers have access to a specific kind of malware known as a keylogger. These pieces of software record and transmit everything you do with your keyboard and mouse. That means every word you type – even words you type and then subsequently delete. It means every email you send, every chat message, every Skype message, every Slack message, every tweet, every Facebook update, and every URL your type into your browser.

Andrew Sanders by Andrew Sanders March 13, 2019
Are Unnecessary Apps Clogging Your PC?
Are Unnecessary Apps Clogging Your PC?

Shovelware. Bloatware. Adware.  There refer to programs that are running on your PC – and that may be active right now – but that most people don’t know about and never use. These programs clog your limited hard drive space, hog your memory, and generally degrade the performance of your computer.

Andrew Sanders by Andrew Sanders March 13, 2019
What Is a Zero-Day Exploit? And How to Defend Yourself in 2019
What Is a Zero-Day Exploit? And How to Defend Yourself in 2019

You kept your antivirus software up-to-date. You had a firewall in place. Your employees went through all necessary cybersecurity awareness training.

And yet, your company still experienced a security incident. Now, you’re left wondering—what is a zero-day exploit (and how did it get past my cyber defenses)?

Joe Michalowski by Joe Michalowski March 13, 2019
What is Adware? And How to Remove It in 2019
What is Adware? And How to Remove It in 2019

In the golden age of digital advertising, we’re constantly bombarded with ads, pop-ups, pop-overs, and video overlays as we browse the web.

While sometimes annoying, most of these ads are easily dismissed or ignored, and they’re often legitimate efforts by publishers to monetize their content.

Evan Porter by Evan Porter March 13, 2019
What is an SQL Injection Attack? And How to Prevent It in 2019
What is an SQL Injection Attack? And How to Prevent It in 2019

SQL is a programming language that allows programmers to “talk” to large databases using nearly-plain English.

It can access and manipulate data held in a number of tables on a server. When it comes to websites, those tables might include sensitive items like usernames, passwords, credit card numbers, and more.

Evan Porter by Evan Porter March 13, 2019