- Ad-Aware Free Antivirus+
- Ad-Aware Personal Security
- Ad-Aware Pro Security
- Ad-Aware Total Security
- Ad-Aware Web Companion
- PC Tuneup
- Data Security
- Trial Center
- Security Center
- English ▾
- Contact Us
There no doubt that spam is a major issue for most internet users. Since the celebrated arrival of email, spammers have found it to be a suitable medium to promote their products and services. Spam has evolved from consisting of harmless advertisements to becoming a carrier of dangerous viruses and other applications that can damage your computer. These junk emails are also known to cause identity theft wherein a user’s personal details are hijacked by the spammers through devious means.
It's springtime! It's the familiar time to tackle the grime that's built up in our homes over the winter months. You may know all the tricks when it comes to scrubbing, polishing, and organizing your house. Confused when it comes to your PC? Freshen up your computer with our roundup of 11 time-tested cleaning tricks, on the inside and out.
With school and college terms now in full swing, there’s no better time for teachers and families to learn about the simple steps to take to stay safe and secure online. While the Internet is a limitless tool for children to learn and play, at the same time they often lack the knowledge they need on how to stay safe online. New malware traps are being set and online tricks being pulled, it's important to keep an eye on the ways you can help them to understand the threats they may face this season.
Spring has sprung! Goodbye cold, miserable winter days. Hello warm(er), spring weather! It’s that time of the year where you start dusting away those winter blues and take charge of organizing your household. Why not use the same idea to your computer too? Spring cleaning your computer makes the system run faster and lets you to work more efficiently.
There are few very simple tips you can take and utilities you can use to clean up the ‘debris’ that may be cluttering up your system:
Critical vulnerabilities have been identified in Adobe Flash Player 10.1.85.3 and earlier versions for Windows, Macintosh, Linux, and Solaris, and Adobe Flash Player 10.1.95.1 for Android. These vulnerabilities, including CVE-2010-3654 referenced in Security Advisory APSA10-05, could cause the application to crash and could potentially allow an attacker to take control of the affected system.
Full Adobe advisory info here.
Affected software includes:
Windows is an attractive platform for the malware writers, in part, because of the sheer number of users. As Microsoft creep towards making their offerings more secure, applications are increasingly becoming the focus for vulnerability exploitation.
Like Windows, Adobe products are a default software choice for most users. The bad guys know this and realise that its profitable to scrutinise their applications for exploitable vulnerabilities and create malware to take advantage of the fact.
Firefox 3.6.11 and Thunderbird 3.15 have been released which include security updates for several critical vulnerabilities that can be exploited to run malicious code. Users are advised to update these applications.
Full details about the updates here:
Its a good idea to set these applications to check for updates automatically.
So, you’ve just bought a new PC or installed a fresh version of Windows. The simple fact is it's not as secure as it could be.
It doesn’t take much to tighten up your PC’s defenses - even if your computer has been up and running for a while, it’s not too late to carry out a security audit on your machine.
You probably wouldn’t leave your house without checking the windows are closed and the doors are locked. Why would you do that? Well, to stop someone breaking in and stealing your stuff or to prevent people just walking in and spray painting the walls.
October is Cybersecurity Awareness Month so we thought we'd contribute by providing some practical, easy to digest and useful information on how to strengthen your PC's defences against attacks.
I'll be discussing what to secure and exactly how to do it, focusing on the ‘how’ more than the ‘why’. Just follow along - it’s easy. Here's what will be covered in some upcoming blogs: