We are constantly installing new software and add-ons, but how do we know if this software is safe to use? In this video, you’ll learn about add-ons and attachments, and I’ll give you some real-world examples of malicious add-ons.
The bad guys know that attachments and add-ons are some of the easiest ways to attack our computer systems. In this video, you’ll learn about malicious attachments and how some bad guys have used add-ons to take over our PCs.
Internet Explorer is one of the most popular browsers in the world, and there are a number of management and configuration options available for IE. In this video, you’ll learn about compatibility view, security settings, search providers, add-ons, InPrivate modes, and certificates.