Where in the World are Infected Devices Most Common?

When you decide that you’re done working for the day and log off until the next morning, your computer might not be going to sleep when you do. If it’s been infected by a botnet attack, there is a very high chance that the machine is still actively phoning Command-and-Control servers, receiving and acting on instructions to perform nefarious activities. Your computer could be working long into the night, sending out spam emails by the thousands or even participating in ...

Networks in Space: When data goes supernova

The universe is big, mysterious and full of secrets.

Every day, servers exchange enormous amounts of data. Usually, this data is kept and archived for a defined period of time. As we store more and more information, our desire to understand its behavior grows. The reason is simple: knowledge is powerful. So, if we identify a pattern in our past, we master the present – then we can predict the future.

Today’s data scientists are the modern oracles, always trying ...

Announcing New Security Categories

We always want to ensure that we are providing the best security protection from malicious activity for our customers at all times. This is why, after careful discussion and research, we’ve added Mobile Threats, Drive-By Downloads/Exploits, High Risk Sites and Dynamic DNS categories to the security categories repertoire.

The Mobile Threats category is pretty much exactly what it sounds like. Prevent threats that are specifically designed to infect your mobile devices, such as phones, tablets, phone tablets, camera phones, smart phones, cellular ...