Deutsch (German)Dansk (Danish)Norsk bokmål (Norwegian Bokmål)Svenska (Swedish)
English
  • Terms and Conditions
  • EULA
  • Affiliate
  • Anti Explorators Security Blog
  • My Account
Anti Explorator
0
Product was successfully added to your cart
  • Free Trial
  • About Anti Explorator
  • Security Encyclopedia
  • Support 24/7
  • BUY IT
Your browser does not support the video tag.

Anti Explorators Security Blog

index

Critical vulnerabilities located in Microsoft software

April 25, 2017Kenneth Jørgensen

Microsoft, developers of the well-known Windows, Microsoft Office, Internet Explorer, Edge and many other programs have recently released no less than 14 security warnings, where six of these are categorized as critical. As a user of Microsoft software, you should most definitely read this article. No less than 68 vulnerabilities where found in Microsoft, and have already been exploited by hackers. As of yet it is unknown how many have been hit by these attacks, and the damage done. After these attacks, Google publicly announced these security warnings only 10 days after a number of corporations in the security industry had announced the issues. Google gave the affected companies one week to fix any security breaches, and if not, they claim that the companies are responsible for any attacks and damages caused by the attacks. In a statement Microsoft claims that the publications of these issues is putting the users…

Read More
flat-2126885__340

Beware of scammers trying to “help”

April 18, 2017Kenneth Jørgensen

Scammers trying to get access to personal information on private computers is nothing new. The fact that the number of tools available for scammers is constantly growing, is why most people have heard about ransomware, spyware and malware. One of the most common ways for scammers to trick users is by pretending to be a supporter from a known company, Microsoft, Facebook etc. In some cases you receive a mail that claims there is an infection or another issue, in other cases the you receive an call. What they both have in common is that they claim that your system is faulty, and they then proceed to “helping” you. These kind of tricks have been around for many years, though in recent years a new and more advanced scam. Here malicious code is used to lock the system, and at the same time offers to help with the condition IF…

Read More
ransom

“Ransomware as service” gaining ground

March 21, 2017Kenneth Jørgensen

Most likely a term unknown to many users but actually affecting more than you think. In short, “Ransomware as a service” is a tool for cybercriminals to develop and publish different types of ransomware – without having a greater technical insight. This phenomenon have caused several new strains of ransomware to appear, and thus even more ransomware attacks. Due to these circumstances and the number of infected computers, the attacks are not limited to private users. Companies and institutions are also being attacked at an increasing rate. How does it work? “Ransomware as service” offers cybercriminals the option to buy a template and the tools necessary to develop software that can cause great harm to any system. These types of attack have in most cases originated in Europe but now attacks also occur from Asia and Africa. The easy access to templates and tools is one of the defining factors…

Read More
EU

New ransomware attacks hits Europe

March 21, 2017Kenneth Jørgensen

The new year have barely begun and a new wave of ransomware threats hits many European countries, Denmark in particular is being targeted. It is estimated that we at this time in 2017 already have more ransomware infections compared to the entire last year. Even taking into consideration that 2016 was at an all high when it came to reported infections. The attacks are hitting not only Denmark but also several other countries in Europe, where Belgium, Spain and The Netherlands are hit hard. This goes to show, that ransomware know no boundaries and is easily translated to local languages. This increases the potential for infections dramatically. There is many different types of ransomware, common for all of them is that you as a user, have to give the malicious code acces to your system. For this reason, ransomware is usually disguised in an attached file that requires you to…

Read More
Phising

Phishing keeps getting more advanced

March 21, 2017Kenneth Jørgensen

It is no secret to anyone that phishing, ransomware, spyware and other threats keeps getting more and more advanced, in the hunt for unprotected personal data. Phishing is a way to get unsuspecting users to share their login information from different accounts when using their workstation, email account, private banking and such. Phishing is not an uncommon phenomenon, which is why phishing attracts a lot of attention from the online security industry. This in return forces shady companies to get increasingly more creative in how they try to swindle users. Last summer a new type of phishing was discovered. Here they user was mailed with an “important” document, and was then asked to go to an external site to gain access. When visiting the site, an unreadable document would be presented in the background alongside a popup, asking for a login and password. Many users would the procced to give…

Read More
castle-1583281__340

New Ransomware threats you need to know!

March 6, 2017Kenneth Jørgensen

As mentioned more than once by our editorial staff at Anti Explorator Ransomware is still one of the most dangerous and current threats towards your online security. To avoid being the victim of Ransomware  you need to keep yourself updated at all times when new threats emerges, this warning is not to be taken lightly. Some of the newest Ransomware threats are “Popcorn Time”, “Golden Eye” and “Koolova” common for all of them is the way the infect and effects your computer, there is however a big difference in the way they act and operate. Learn more about these threats below. Popcorn Time: A very sophisticated type af Ransomware that not only infects your computer but actually urges you to infect other computers, so you can get rid of yours. Trying to rid your computer of Popcorn time in that way is illegal, and have not shown to have any…

Read More
padlock-597495__340

3 easy ways to increase your online security

February 23, 2017Kenneth Jørgensen

Making your computer a spyware free zone is an inordinate huge tusk, the truth of the matter is that you relatively fast and easy can protect yourself against a large range of threats. Any way you look at it, it is extremely important to make sure that you take your time to make sure that there are no threats on your computer. Attacks from spyware can be very devastating. One of the most common issues is that the computer is not protected against spyware, and in no time, the computer is virtually impossible to use. In other cases ransomware attacks locks the computer, without anyone can do anything to fix it. We have selected three easy go-to tips that most users should be able to to themselves regardless of technical insight. 1: Stay vigilant! We know. You heard it a thousand times. Do not under in circumstances open or run…

Read More
cup-1010916_960_720

Anti Explorator now downloaded more than 10.000 times

January 19, 2017Kenneth Jørgensen

2017 is upon us and what a start! Our users have downloaded Anti Explorator more than 10.000 since our launch in 2016, and we are proud of reaching this milestone and the enormous amount of trust our users have shown us. From the very beginning our main goal have been to offer our users, despite technical prerequisites and knowhow, a way to gain access to a simple and effective tool to secure their computer against spyware. We have designed Anti Explorator specifically to eliminate threats to your online security, and the huge interest by our users signals, that there is urgent need for this type of software. It is crucial that Anti Explorator is user-friendly and users can receive the support they need. This is why we at Anti Explorator offers support any day of the week, and furthermore offer it in our users local language. We all know the…

Read More
new-years-eve-1789147__340

Welcome to 2017

January 18, 2017Kenneth Jørgensen

At Anti Explorator we would like to welcome all of our users to 2017, and hope that all made it safely into the new year. For many the New Year comes with a New Year’s resolution and almost anyone know someone that have made one this year. For most people a New Year’s resolution is that you want to eat healthier, spend more time in the gym, and spend more time with the family or something completely different. At Anti Explorator, our New Year’s resolution is to make Anti Explorator even stronger, easier to use, and help as many users possible to a better and more secure online experience. These resolutions are backed up by a new version of Anti Explorator, which you very soon will be able to download. We have also decided to fortify our support team with more employees, who all wants to offer the best possible…

Read More
blueprint

Technology and its huge impact on our lives

January 1, 2017Kenneth Jørgensen

Technology is the major factor when it comes to events that effect our everyday lives. 100 years ago, the vacuum cleaner was a relatively new phenomenon in the western world, now almost every household have at least one. Just like the vacuum cleaner, the personal computer (PC) is now found in most households, and in many cases each household have more than one. Today it’s almost impossible to function without your laptop, tablet, smartphone and of course the PC – and all the possibilities they offer. Technology is one of the driving factors in increasing wealth by better utilizing resources and time more efficient, for those who have the possibility to use it. Technology is not only a blessing, but can be dangerous if not used with caution. Just think about how vulnerable IT, electronics and software is and how easily those security breaches can be used by hackers or…

Read More

Posts navigation

< 1 2 3 4 … 6 >
© 2015 - All rights reserved. Anti-Explorator
Facebook