1. How to Enable Cryptominer Protection on Firefox Version 67.


    A short tutorial showing you how to take advantage of Mozilla Firefox’s new Cryptominer protection feature. A feature new to Firefox 67 that when enabled prevents malicious websites from using your system's hardware to mine for cryptocurrency.

  2. How to Check if Your ASUS Computer Has Been Infected By ASUS Update Malware. (ShadowHammer)


    A short tutorial showing you how to check if your ASUS PC has been affected by the ShadowHammer ASUS Update Manager malware. A recently discovered threat to ASUS PC users who have been using ASUS’s Live Update software.

  3. How to Stop Google Chrome Automatically Trying to Install Extensions. (Unwanted Extensions Automatically Installing on Chrome)


    A short tutorial showing you how to stop unwanted extensions automatically adding themselves to Google Chrome. Extensions such as ‘Cute HD Panda wallpapers’, ‘Doctor Strange HD Wallpapers’, and other ‘HD Wallpapers’.

  4. How to Protect Windows Computers and Windows Surface Tablets From Meltdown and Spectre.


    It has recently been discovered that almost all Computers and Smart devices made in the last 20 years have 2 major security flaws which go by the name Meltdown and Spectre. Though it is extremely difficult to exploit these security flaws, it is still possible and hackers love a challenge, so make sure you follow the steps shown in this guide to drastically reduce your chance of falling victim to both Meltdown and Spectre.

  5. How to Disable SMBv1 Protocol in Windows to Avoid Ransomware.


    A very detailed guide showing you how to disable the SMBv1 protocol  (Server Message Block version 1)  in Windows. Making this simple change will help you avoid ransomware, exploits like WannaCry and Petya. The SMBv1 protocol is still installed in Windows 10 even though the operating system currently uses the latest updated version of the protocol, SMBv3.

  6. How to Find and Remove Stalkerware From Your Computer or Mobile Devices.


    Another day. Another security & privacy threat. The newest addition to the ever-growing list of threats is Stalkerware. This article will show you a few different ways you can check to see if you have been affected, how to prevent future harm, and how to remove Stalkerware if it is already installed on your device.  

  7. How to Prevent and Remove Viruses and Malware on Android Devices.


    In the scheme of things, Android viruses aren’t all that common, although they do exist and can cause plenty of heartache. Apps that are download loaded from the official Google Play Store are screened vigorously before they are approved and uploaded to the Store, making it a super safe place to get apps. But! The Play Store isn’t the only place you can download apps, so you should know how to minimize your risk of being infected and how to respond if you have been infected by an Android Virus.

  8. New Android Trojan Discovered, Called Geinimi


    A new malicious program targeted at devices running under Google Android operating system was discovered in China recently. Dubbed “Geinimi,” the Trojan is reportedly one of the most sophisticated Android malware to date. The solution ...