Heimdal
Latest Articles

Posts

Cybersecurity Basics | Quick Read

Adware: Definition and Removal Guide

Because life’s too short to look at unwanted ads

Social | Quick Read

Beware of Scams Using Fake Facebook Profiles

…or Twitter, Instagram and LinkedIn for that matter

Account security | Quick Read

How Every Cyber Attack Works - A Full List

Which of these cyber attacks will hack you?

Data security | Quick Read

How Flash Vulnerabilities Expose You To Attacks

It’s time you learnt how to live without Flash and its security risks

Account security | Quick Read

How Cybercriminals Hack Facebook, Instagram and Snapchat Passwords

Learn to keep the bad guys away from your Internet life

Data security | Quick Read

11 Steps to Improve Your Public Wi-Fi Security

Because cybercriminals love public Wi-Fi just like you

Security alerts | Quick Read

Security Alert: GootKit, Godzilla Infostealers Go For Financial Information

These examples show how cyber attackers operate to collect & steal your financial data

Security alerts | Quick Read

Malicious Script Injections Use Nemucod To Spread Cerber Ransomware

This ransomware campaign uses a stealthy malware cocktail to encrypt your files

Security alerts | Quick Read

Security Alert: LinkedIn Phishing Campaign Promises Security

Don’t fall for this email that cybercriminals use to obtain your confidential data

Data security | Quick Read

Practical Online Protection: Where Malware Hides

Find out how cybercriminals disguise their malicious code in files you use every day

Data security | Quick Read

131 Cybersecurity Tips that Anyone Can Apply

Online safety doesn’t have to be complicated and this list proves it

Security alerts | Quick Read

Security Alert: Adwind RAT Used in Targeted Attacks with Zero AV Detection

This malware lets cyber criminals remotely control PCs and no antivirus can detect it

Data security | Quick Read

50+ Internet Security Tips & Tricks from Top Experts

If you’re looking for a shortcut to better Internet security, this is the resource you need to read.

How to | Quick Read

How to Protect Your PC with Multiple Layers of Security

Ask yourself: if one layer of defense falls, what will be left to protect you?

How to | Quick Read

Boost Your LinkedIn Security and Privacy in 10 Actionable Steps [Updated]

And keep your professional demeanor safe at all times

How to | Quick Read

Here's How to Strengthen Your Twitter Security and Privacy in 10 Steps

Keep cyber criminals from hacking your account and compromising your reputation

How to | Quick Read

The Ultimate Guide to Angler Exploit Kit for Non-Technical People

In 2015, Angler enabled cyber criminals to steal and extort $34 million from their victims

How to | Quick Read

How to Master Your App Permissions So You Don’t Get Hacked – The Full Guide

Control who you give access to your data to and you’ll be a lot safer

Data security | Quick Read

How Traffic Filtering Can Secure your PC from Cyber Threats

The bulk of cyber attacks are delivered through your Internet Traffic. But what if you could filter them out?

How to | Quick Read

Spring Cleaning: How to Remove Old Software that makes your PC Vulnerable

Comes with step-by-step advice that will improve your data safety

How to | Quick Read

How To Improve Your Online Safety: Sign up for The Daily Security Tip

This daily email will help you secure your online world

How to | Quick Read

10 Ways to Help Our Parents With Online Security

Essential security mistakes our parents are making and what we can do about them

Security alerts | Quick Read

Mazar BOT - the Android Malware That Can Erase Your Phone

The mobile malware that gives attackers full control over your mobile phone

Data security | Quick Read

True Story: About the Time I Got Hacked and Lost All My Work

From my own experience, 7 lessons I learnt the hard way

How to | Quick Read

Understanding Fileless Malware Infections – The Full Guide

How cyber criminals made their attacks undetectable by antivirus products

Security alerts | Quick Read

Security Alert: Dridex malware creators deceive victims with fake IKEA receipt

Don’t fall for this type of scam that leverages your trust in established brands

How to | Quick Read

15+ Online Habits That Are Compromising Your Online Safety

You are involuntarily exposing yourself to attack right now. Will you do something to change that?

Vulnerability | Quick Read

Why Java Vulnerabilities Are One of Your Biggest Security Problems

This software used by millions is one of the key targets for cyber criminals

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats