- Ad-Aware Free Antivirus+
- Ad-Aware Personal Security
- Ad-Aware Pro Security
- Ad-Aware Total Security
- Ad-Aware Business Security
- PC Tuneup
- Data Security
- Trial Center
- Security Center
- English ▾
- Contact Us
That’s right, today is Data Privacy Day. It’s a day marked to raise awareness on protecting personal information online, especially on social networking sites.
What does it mean for you? It might not be an official holiday, but it’s a good reminder of the ways that all of us can better secure our private data and our Internet privacy.
In Lavasoft CEO Jason King’s commentary on the cyber attacks that targeted Google and dozens of other high profile targets, he noted that these so-called Aurora attacks were heard about and felt all around the Web, and around the World, making them of interest to us all to see what else develops. In just one week since that report was published, there have been a number of developments and interesting industry commentary on this.
So, for those following this story, here are a few of these updates:
An important notice for any users of Ad-Aware 2008 –
As of January 31, 2010, technical support and Definitions File threat updates will be discontinued for Ad-Aware 2008.
To stay safe online, make sure to use the current version of Ad-Aware. You can see which version you’re using through Ad-Aware’s interface – just click the ‘About’ button.
If you use Ad-Aware 2008, please download and install the latest version of Ad-Aware (version 8.1.4) in order to stay protected from online threats. Here’s how to upgrade:
- For those with an Ad-Aware 2008 license -
- For those using Ad-Aware 2008 Free -
You can download and install the latest version of Ad-Aware Free here.
(Your 2008 version will be replaced during the installation process.)
In light of recent rise in use of Adobe Reader exploits, we ask each of you to update to the latest version of the software. This popular software is on so many of your machines and it is imperative that you get the patches for recent Internet security vulnerabilities.
- 1 of 2