Security Advisor
Security Advisor is the place to visit for the latest internet security news, PC security advice, security software reviews and useful software downloads
Bitdefender Total Security 2014 review: one of the best internet security suites you can buy
Bitdefender Total Security 2014 has more modules and facets than most suites and combines these…
5 of the best free antivirus programs for Windows PC, laptop or tablet
The best free security software for your PC
How to prevent your identity being stolen on Facebook
8 steps to staying safe and secure on Facebook
McAfee All Access 2012 review
McAfee All Access 2012 is an internet security suite that protects every device in your house, including smartphones, tablets and Macs.
-
Panda Global Protection 2014 review: easy to set up and use security software
Panda Global Protection 2014 is very easy to set up and use and offers good coverage of the key…
-
Kaspersky PURE 3.0 Total Security review: top-of-the-range internet security product
PURE 3.0 Total Security is Kaspersky's top-of-the-range internet security product, with a lot…
-
Bitdefender Total Security 2014 review: one of the best internet security suites you can buy
Bitdefender Total Security 2014 has more modules and facets than most suites and combines these…
-
Y-cam HomeMonitor review - get peace of mind by installing a home security camera
Get peace of mind by installing a security camera in your home or business premises to catch out…
-
Dashlane review - password manager has great interface
With its simple interface and myriad of features, Dashlane is a powerful password manager anyone…
-
Securstore review: cloud-based backup solution
The Securstore backup solution is a cloud-based system using software from Canada-headquartered…
China-based hacking group behind hundreds of attacks on U.S. companies
Hidden Lynx hacking-for-hire group more sophisticated than others, including using malware targeting zero-day flaws, Symantec says
-
Security researchers create undetectable hardware trojans
Method can be used to weaken hardware random number generators used for encryption
-
Protect your business from Web celebs
The McAfee 2013 Most Dangerous Celebrities report is out. Here's how to avoid becoming a victim.
-
Zettaset working toward Big Data encryption for Hadoop
-
Space storms causing satellite failures that blunt Internet and TVs
MIT say solar flares and geomagnetic storms are the cause of most satellite failures in recent years
-
Government to test location-based mobile alerts to warn public of emergencies
The Cabinet Office is working with EE, Vodafone and O2
-
EnergyAustralia customers targeted with scam email
-
Mevade botnet miscalculated effect on Tor network, says Damballa
Little-known botnet botches C&C migration
-
Netfix plumbs pirate sites before buying TV shows
-
Proposed changes to WHOIS system called 'extremely disquieting'
-
HP rolls out next-gen firewall line, threat-detection service
Security Videos
iStorage datAshur 8GB video review
The iStorage datAshur 8GB's combination of hardware encryption, physical keypad and tamper-proofing make it virtually un-hackable. We put this USB flash drive through its paces. Here's our iStorage datAshur 8GB video review.
Security Downloads
-
AVG AntiVirus 2014 v14.0.4117
Hunt down and destroy malware with AVG's latest release
-
AVG Premium Security 2014 v14.0.4117
Block malware and hackers, speed up your PC and protect yourself from…
-
AVG Internet Security 2014 v14.0.4117
This popular security suite is faster, more lightweight and smarter than ever
-
Hidden File Finder 2.5
Quickly check for hidden files on your PC
-
360 Internet Security 2013 (64-bit)
Block malware with China's favourite antivirus tool


