The Pit Blog

Threats to Your Mobile Phone Privacy are Real

phones

Saw a presentation last week about mobile spyware.

This YouTube clip (nearly 5 million views) was shown – I was shocked.

Keep in mind, this video report is 2 years old.

The prevelance of these mobile security/privacy threats is debatable. However, it doesn’t seem like much of a reach to forsee these issues exploding right along with the mobile phone market.

Threats to Your Mobile Phone Privacy are Real Read More »

6 Steps To Remove Malware Completely

exterminate1

Malware can mutate within minutes. If you’re infected, clean it fast and clean it completely.

First and foremost have a solid and reliable detection and removal program installed on your system. I use and recommend PC Matic everyday. It’s my first line of defense. I run PC Matic once a week and let it check for infections while it cleans and updates my system. The latest virus definitions are updated from our server each time I run the program. I know I’m ahead of the curve for detection.

6 Steps To Remove Malware Completely Read More »

The World of Computer Security

Thanks for the tremendous response to our last piece analyzing the state of the security industry. We firmly believe that using cloud technology can help us better understand security issues and therefore make better security products. In this edition, we decided to analyze the distinctions between security in different parts of the world. We analyzed which types of security threats were most prevalent by region. We also analyzed which security software was most prevalent by region.

The World of Computer Security Read More »