The votes have been tallied in the Softonic Awards 2008 and the results of your selections of the best programs of the year are now in.

And the win for the Best Anti-spyware program goes to ?

Ad-Aware 2008!

Thanks to everyone who voted for our software!



Early Warning

by Wolfa on September 29th, 2008 in Everyday Life at Lavasoft.

Navigating the Sea of Fake Codecs

by Pekka on September 29th, 2008 in Security Tips.

The Internet has become a major scene for sharing all sorts of media files. These files may have been compressed using different codecs, some free and some commercial. What is a codec? A codec, in this case, is used to decode compressed data streams in order to make them viewable and audible in a proper player. Watching an AVI (Audio Video Interleaved) video and audio file with compressed data, or other compressed movie formats, may require a proper codec. The amount of codecs out there amounts to a level that makes it hard for common users to find and install the correct one required to play an eagerly awaited sequence of images. The situation gets even more complicated considering that unscrupulous individuals want to transform the common codec-eagerness into cash in, one way or another, by offering fake codecs. Read more below about false codec lures, codecs in general and possible ways to avoid getting scammed-


Video Tutorials for Ad-AwareYou may have noticed that we posted some instruction videos for Ad-Aware a while ago. If you haven't watched them already, I highly recommend it - Patrick's done a great job with these with lots of useful information, especially in the later installments.

  While we are on the subject of Internet video, Mjukvara.se has published a couple of nice video reviews for Ad-Aware and Lavasoft Personal Firewall in Swedish. So if you speak the language of vikings, check out the videos - they're quite well made.

Mjukvara.se: Swedish review of Ad-Aware 2008 Pro
Mjukvara.se: Swedish review of Lavasoft Personal Firewall


In the U.S., the upcoming presidential election in November is not just a political hot topic - it has also found its way into the security arena.

Months ago, security experts began predicting that online scammers would take advantage of the media hype surrounding the presidential candidates to prey on computer users. We're already seeing the online risks being noted and reported in a number of ways, including:

Compliment

by Wolfa on September 19th, 2008 in Everyday Life at Lavasoft.

A word of caution as you browse the Web: even reputable sites are not immune to being compromised in order to be used as a means to infect visitors with malicious content.

This past week, the news magazine, BusinessWeek, became the latest trusted site to fall victim to SQL injection attacks, according to reports.


Sadness

by Wolfa on September 12th, 2008 in Everyday Life at Lavasoft.

Google's New Browser

by Erin on September 9th, 2008 in Industry and Security News.

Many have debated the security pros and cons of today's most popular Web browsers - Internet Explorer and Firefox. Now there's a new browser in town: Chrome.

Even though it's only one week old, you've probably heard the buzz about Googles new browser. Security, of course, is at the forefront of most discussions.


New Office

by Wolfa on September 5th, 2008 in Everyday Life at Lavasoft.

Gustav Brews Scams

by Erin on September 3rd, 2008 in Security Alerts, Security Tips.

What bad online behavior should you be on the lookout for this week? Take note as you surf the Web in the coming days: cyber scammers are taking advantage of Hurricane Gustav - a storm that caused havoc in the U.S. and Caribbean - in order to prey on well-meaning consumers.


As people move an increasing part of their lives into global and local networks, the development of privacy intrusion techniques and technologies faces exponential growth. The will to eavesdrop on other's private communication is reaching new heights. As this occurs, the concept of privacy is being obliterated. Privacy is under attack, giving birth to the current situation where consumer's private information is commonly considered to be an approved target. The constantly increasing demand to acquire personal and confidential information has boosted the supply of eavesdropping techniques and technology.