<img src="https://d5nxst8fruw4z.cloudfront.net/atrk.gif?account=5DiPo1IWhd1070" style="display:none" height="1" width="1" alt=""/>
  • content/en-au/images/repository/isc/2017-images/hardware-and-software-safety-img-23.jpg

    Removing Malicious Code & Malware

    There can be a number of reasons why malicious software may have been able to infect a machine that already had antivirus software running on it.

    Read more
  • content/en-au/images/repository/isc/avoid-android-malware.jpg

    How to Spot (and Avoid) Android Malware

    Android malware is increasingly common, and that means mobile device-users need to be on guard when it comes to what types of apps they choose to download. Through malicious malware — in the form of apps — hackers can easily take hold of your personal data.

    Read more
  • content/en-au/images/repository/isc/2017-images/hardware-and-software-safety-img-27.jpg

    Small Business Security Calls for Vigilance, Tools

    Your small business network may be under attack by cybercriminals. We don't need any inside information to know this, and it is not a scare line. It is a basic fact of business in the Internet age. Unlike "brick-and-mortar" thieves, who have to spend time and effort looking for places to break into, cybercriminals can case out thousands of potential targets with a few keystrokes...

    Read more
  • content/en-au/images/repository/isc/2017-images/hardware-and-software-safety-img-07.jpg

    Avoiding a Trojan Virus: Keeping the Gates Closed

    Trojans are a type of malware disguised as legitimate software. Learn the risks and how to protect yourself here.

    Read more
  • content/en-au/images/repository/isc/2017-images/hardware-and-software-safety-img-34.jpg

    What is Phishing and how does it affect email users

    Anyone who uses email can be a target for phishing scammers. When people ask, "what is phishing?" the most common scenario is as follows: You open your email and suddenly an alert from your bank appears in your inbox. When you click the link in the email, you are taken to a webpage that looks, more or less, like your bank's — but is actually designed to steal your information. The alert will say there is a problem with your account, and ask you to confirm your login and password. After entering your credentials on the page that appears, you are usually sent to the actual institution to enter your information a second time. By steering you to the legitimate institution, you don't immediately realize your information was stolen.

    Read more
  • content/en-au/images/repository/isc/mobile-phone-security.jpg

    Mobile Security Threats Stay on the Move

    Are traditional computers — desktop machines and laptops — more secure than mobile devices such as smartphones and tablets? Even experts do not always agree about this question, because both computers and mobile devices pose security threats. But as long as you take common-sense precautions, you can build solid desktop and mobile security.

    Read more
  • content/en-au/images/repository/isc/2017-images/hardware-and-software-safety-img-04.jpg

    Malware and Exploit Detection

    In order to deliver adequate computer protection, antivirus software should be capable of detecting a very wide range of existing malicious programs, detecting new modifications of known computer viruses, worms and Trojan viruses and detecting malicious software that’s located in packaged files.

    Read more
  • content/en-au/images/repository/isc/types-of-cybercrimes-tips.jpg

    Avoid Most Types of Cybercrime With These Simple Tips

    In recent years, criminals have shifted their efforts into cyberspace — with the right tools and know-how, they can commit crimes in the comfort of their living rooms. Cybercriminals today use malware, phishing and spam to scam victims out of various amounts of money.

    Read more
  • content/en-au/images/repository/isc/2017-images/virus-img-02.jpg

    What is a Boot Sector Virus?

    The recent explosion in cell phone spyware can be directly linked to the way cell phone use has changed over the past few years. What was once just a way to stay in touch while away from home or out of the office is now an integral part of everyday life. So many people live their lives on their phones, storing their personal information and recording almost everything they do, that cell phones have now become a prime target for spying software.

    Read more
  • content/en-au/images/repository/isc/2017-images/internet-safety-tips-img-15.jpg

    Staying Safe on Social Media

    The family meeting now involves discussions on Internet safety for kids — what parents expect from their children in terms of responsible Internet usage, and discussions about common-sense precautions that will keep kids safe online...

    Read more
Resources not available.