Heimdal
Latest Articles

Posts

Security alerts | Quick Read

Security Alert: GootKit, Godzilla Infostealers Go For Financial Information

These examples show how cyber attackers operate to collect & steal your financial data

Security alerts | Quick Read

Malicious Script Injections Use Nemucod To Spread Cerber Ransomware

This ransomware campaign uses a stealthy malware cocktail to encrypt your files

Security alerts | Quick Read

Security Alert: LinkedIn Phishing Campaign Promises Security

Don’t fall for this email that cybercriminals use to obtain your confidential data

Data security | Quick Read

Practical Online Protection: Where Malware Hides

Find out how cybercriminals disguise their malicious code in files you use every day

Data security | Quick Read

131 Cybersecurity Tips that Anyone Can Apply

Online safety doesn’t have to be complicated and this list proves it

Security alerts | Quick Read

Security Alert: Adwind RAT Used in Targeted Attacks with Zero AV Detection

This malware lets cyber criminals remotely control PCs and no antivirus can detect it

Data security | Quick Read

50+ Internet Security Tips & Tricks from Top Experts

If you’re looking for a shortcut to better Internet security, this is the resource you need to read.

How to | Quick Read

How to Protect Your PC with Multiple Layers of Security

Ask yourself: if one layer of defense falls, what will be left to protect you?

How to | Quick Read

Boost Your LinkedIn Security and Privacy in 10 Actionable Steps [Updated]

And keep your professional demeanor safe at all times

How to | Quick Read

Here's How to Strengthen Your Twitter Security and Privacy in 10 Steps

Keep cyber criminals from hacking your account and compromising your reputation

How to | Quick Read

The Ultimate Guide to Angler Exploit Kit for Non-Technical People

In 2015, Angler enabled cyber criminals to steal and extort $34 million from their victims

How to | Quick Read

How to Master Your App Permissions So You Don’t Get Hacked – The Full Guide

Control who you give access to your data to and you’ll be a lot safer

Data security | Quick Read

How Traffic Filtering Can Secure your PC from Cyber Threats

The bulk of cyber attacks are delivered through your Internet Traffic. But what if you could filter them out?

How to | Quick Read

Spring Cleaning: How to Remove Old Software that makes your PC Vulnerable

Comes with step-by-step advice that will improve your data safety

How to | Quick Read

How To Improve Your Online Safety: Sign up for The Daily Security Tip

This daily email will help you secure your online world

How to | Quick Read

10 Ways to Help Our Parents With Online Security

Essential security mistakes our parents are making and what we can do about them

Security alerts | Quick Read

Mazar BOT - the Android Malware That Can Erase Your Phone

The mobile malware that gives attackers full control over your mobile phone

Data security | Quick Read

True Story: About the Time I Got Hacked and Lost All My Work

From my own experience, 7 lessons I learnt the hard way

How to | Quick Read

Understanding Fileless Malware Infections – The Full Guide

How cyber criminals made their attacks undetectable by antivirus products

Security alerts | Quick Read

Security Alert: Dridex malware creators deceive victims with fake IKEA receipt

Don’t fall for this type of scam that leverages your trust in established brands

How to | Quick Read

15+ Online Habits That Are Compromising Your Online Safety

You are involuntarily exposing yourself to attack right now. Will you do something to change that?

Vulnerability | Quick Read

Why Java Vulnerabilities Are One of Your Biggest Security Problems

This software used by millions is one of the key targets for cyber criminals

Security alerts | Quick Read

Security Alert: New spam run spreads banking infostealer in Dridex malware class [UPDATED]

The malicious document that infects your system with data-stealing malware

How to | Quick Read

Announcing the Free Cyber Security for Beginners Course

Build your online security skills for free with this practical course

How to | Quick Read

44 Exciting Cyber Security Conferences around the World

These are the best events to attend to get closer to the heart of cyber security

Data security | Quick Read

All You Need to Know About Nuclear Exploit Kit

Exploit kits play a huge role in the malware economy, and Nuclear is one of the worst

Data security | Quick Read

Heimdal Security + VPN/Proxy = The Ultimate Security & Privacy Combo

Build your online protection in layers and enjoy peace of mind while you browse the web

How to | Quick Read

How to Fix the Critical BadUSB Security Flaw in Less than 10 Minutes

Follow these steps to protect your system against one of the worst IT vulnerabilities

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats