Category: Consumer Threat Notices

Protect Yourself from the Latest Internet Security Threats

Our experts keep you up to date with the latest and most harmful cyberthreats, so you can avoid being victimized. With their insight and advice, you’ll learn ways to keep your devices harm free.

Have you installed CyanogenMod on your Android device? If yes, you’re likely vulnerable to a newly discovered zero-day threat (an attack that takes advantage of a previously unknown vulnerability). If you have no idea what CyanogenMod is—don’t worry, chances are your device is secure. At the Ruxcon Security Conference in Australia last week, a security researcher presented […]

When thinking about biometric security, one might picture Mission Impossible-like retinal scanning or fingerprint reading technology a la the iPhone 6. But did you know that your voice can be a key to your security as well? Major banks, including JPMorgan Chase and Wells Fargo, are employing recorded voice messages to help protect your hard-earned […]

Last week, thousands of Snapchat users had their privacy violated in the same manner as the victims of the now month-old celebgate: they had personal photos and videos shared across the Internet without their consent. Like celebgate, an assumed security protocol was found to either be poorly implemented or nonexistent. Like celebgate, it was found […]

Following the announcement of the 2014 Most Dangerous Celebrities™ earlier this month, our senses have been heightened to scams on the web involving Hollywood’s most famous. Well, it seems our fascination with lifestyles of the rich and famous have led us to yet another attack utilizing well-known celebs to spread malicious software (referred to as […]

When different organizations team up to defeat malicious software, great things can happen. That’s the conclusion we can take away from Apple and Reddit’s cooperation in taking down the iWorm bug affecting roughly 17,000 Mac users across the globe. So what’s iWorm, you ask? iWorm is a malicious program (often called malware) which takes advantage […]