8 Tips to Do Safe Online Shopping this Holiday

Zora KrismanArticle

The holiday season is right around the corner and if you’re like 91% of Americans, you’d be doing some holiday shopping online. However, this is also the time when hackers go “shopping” for consumers’ personal data. For example, 91% of eCommerce sites’ global login traffic came from attacks called “credential stuffing” during 2018’s holiday season. To protect your personal identity and sensitive information from prying eyes, you should understand the latest cybersecurity threats and what you can do to do safe online shopping this holiday season. Key Consumer Cybersecurity Threats in 2019 Here are some tactics frequently used by hackers to steal online … Read More

Antivirus Software – Is One Line of Defense Enough?

Teow-Hin NgairArticle

Many home and business users have a complacent approach to their security in the online world. They put much trust into existing standards that were built to increase safety when browsing the web. While these standards have had a positive impact on reducing day-to-day risks on the internet, malicious software is always evolving. Most recently, news headlines have been flooded with reports about Ransomware like Cryptolocker. These programs can completely encrypt a user or businesses files, blocking access until a ransom payment is made. A lot of the time, these payments are made without any response from the hackers, leaving … Read More

Application Whitelisting – Is There a Simpler Solution?

Teow-Hin NgairArticle

Businesses have used Application Whitelisting for a while now, to keep their computer systems secure. In simple terms, Application Whitelisting permits only a selected number of applications to be installed and launched on a computer system. Any program that is not whitelisted by an IT administrator will be blocked from running. Application Blacklisting is similar in function, stopping any program in a list from running. However, compared to whitelisting, blacklisting cannot stop zero-day attacks on a computer system, meaning it is less effective at securing a network. For consumers, there is a basic security implementation called User Account Control, or … Read More

Why AI is Rewriting the Cybersecurity Rulebook

Teow-Hin NgairArticle

Artificial intelligence (AI) isn’t just about self-driving cars or robots that can hold down a conversation. It’s an entire approach to problem solving that aims to combine the intelligence and creativity of humans with the speed and power of computing. While cybersecurity already relies heavily on automated processes, AI could find new and more effective ways to fight malware. AI is the next step in the evolution of cybersecurity. It’s a field that has become more sophisticated and powerful in efforts to keep up with increasing creativity by cybercriminals: Combine these various technologies and you get today’s cybersecurity systems. It’s … Read More

Back to School PC Security: Protect Your Computers with SecureAPlus Antivirus for Free

SecureAge SecureAPlusArticle

Back to School-Protect Your Computers with SecureAPlus Antivirus for Free

[Update 25 September 2019: You will get 3-Years Essentials when you sign up for SecureAPlus for Education / Non-Profit Program. If your school is a partner, you will get 4-Years Essentials. Click here for more info.] Back to school time is here and it’s that time of the year to help students and educators stay safe online by protecting computers and laptops from harmful digital threats such as ransomware, malware, and virus. You may be wondering:  “What is the big deal about this thing?” According to a survey conducted by Intel Security in the United Kingdom (UK) with 1,000 students, … Read More

Maintenance of SecureAge Technology Servers

SecureAge SecureAPlusArticle

The SecureAge Technology servers will be temporarily shutdown for maintenance on the following date: 17 December 2016 (Saturday) @ 0800H – 2000H SGT For information on when this is on your time zone please visit the following URL: View Maintenance Schedule in Other Timezone Note that the core protection of SecureAPlus from Application Control & Application Whitelisting will still be fully functional and that any untrusted applications will still be blocked from running. The same is also true for Jotti 2nd Opinion Scanning and the Offline AV (if enabled). During this time the following services are affected: SecureAPlus & SecureAge … Read More

The Value of a Good Anti-Virus Software

SecureAge SecureAPlusArticle

the-value-of-good-anti-virus-software

Through the times’ viruses and now malware has evolved in the way it distributes itself – taking full advantage of the Internet and turning itself into a much more significant threat than ever before. Just as viruses have made themselves available and propagating over the web, downloadable anti-virus software is now easily accessible, and a lot of them are free. So the question beckons, in a time when viruses and malware multiple and reinvent at an alarming pace, Essential Features to look for in an Anti-virus In no particular order, these are the five features that you should be looking … Read More

Malware Removal Programs: Everything You Need to Know

SecureAge SecureAPlusArticle

what-you-need-to-know-about-malware-removal-program

Malware removal tools are a dime a dozen these days. It goes to show how big of a problem malware is. But what is the difference between a malware removal tool & anti-malware software? A quick Google Search of the term “malware removal tool” or even “malware removal programs” shows the usual suspects in the consumer IT security industry. So to answer the question, they’re basically the same thing. The main difference is that people who search for these programs this way have the mindset that they’ve already been infected and are looking into a way to essentially find and … Read More

Spyware in a Much Connected World

SecureAge SecureAPlusArticle

spyware-in-a-much-more-connected-world

Spyware was not always used for nefarious purposes. Spyware was initially used as tracking software that was intended for legitimate use such as for employee productivity monitoring (under legal circumstances) and even parental control. Even it’s used for advertising was initially intended to make things better with contextual ads designed to appeal to the most important needs of users who browse the web instead of simply making one-size-fits-all ads on the internet that often miss their mark and run out of budget before they even reach the right audience. From Tracking to Spyware But it’s when these pieces of software … Read More

What is Application Whitelisting and How it can Keep Your PCs Safe?

SecureAge SecureAPlusArticle

Keeping PCs Safe with Application Control & Whitelisting

A PC is always prone to a myriad of threats that come in the form of viruses, malware, and other types of malicious files. Fortunately, there are a lot of antiviruses, anti-malware, and anti-spyware solutions that are available, and most of them are free. However, it is an entirely different matter when it’s the user who allowed malicious threats into the PC. This can happen unknowingly via a zero-day threat bypassing the detection rate of even the best of antiviruses. Alternatively, an infection can happen simply by another user who has equal access to the PC to ignore anti-virus prompts … Read More