How to Really Understand Your Users’ Real Needs? – Free Style

In today’s world of big data, we may have cultivated a habit of thinking in numbers and percentages about everything.

We believe that data can show us everything or we are simply trying to hide our fear of the unknown behind the big numbers. Grouping phenomenon and making things clear are natural in human behavior.

Trying to understand the understandable as well.

People = number?!

Can we count emotions or make an equation that resolves the mystery of user behavior?!

There are many pros and cons here. We are not here to enter the existing philosophical debate about what is bad and what is good when it comes to this matter.

Rather, we are trying to make our own freestyle.

Many things are changing at Zemana but all these changes are centered around one phenomenon which is our user.

So, naturally, in order to make any changes aligned with this phenomena, we have to ask: Who are our users?

For weeks Zemana’s research team has worked on understanding our users and seeing who they are and what they really need and want.

Instead of simply making data queries and algorithmic predictions we invested our time in communicating with our users.

And, we had a lot of fun…

Every day we talked to our users either via phone or via email and we cherished every minute of it. Every person has its own set of beliefs, emotions, and needs.

To understand all of them we believe that simply running a data query is not enough. You need empathy.

You have to become your users.

Theather day


Two of our colleagues made a marvelous job in preparing a theatre for us where they presented who are our users or more precisely showed us what they feel and what they need.

They helped us in making empathy with you in a very entertaining way.

Beyond survey


Beyond surveys and data, there is empathy.

Beyond boring presentations, there is an innovative theatre.

Instead of saying that we are doing research on users we say:

We are working on understanding our users. We are trying to understand how we can help them.

Every product is a reflection of its users and we strongly believe in that. We will try to make ours even better for you.

Help Us Translate Security For Everyone







There is one way to safety but it is expressed in many ways.

In the past months, we have worked hard to make many improvements in our antivirus app, from the web protection module, cloud scanner, improvements in user experience and during that journey we somehow forgot that we have to translate all those changes as well and make them understandable to all our users.

Let’s help each other.

Become part of our translator community and help us in making cyber-security available and understandable to people worldwide.

We want to enrich our app with as many languages as possible and help everyone understand it.


Of course, we will award you and your loved ones with premium licenses and make you a part of Zemana Mobile Antivirus contributors.

How to start?

  1. Send an e-mail to
  2. Translation magic happens
  3. You make many people happy!

Thank you for contributing 🙂

Why clicking the “X” closes Zemana AntiMalware 3.0 on my PC?

Zemana AntiMalware 3.0 is a free malware removal tool. The main purpose of this product is to detected and remove malware from your PC. For free.

Having said that, recently we have seen many support request asking: Why Zemana AntiMalware 3.0 closes when we click on “X”?

For one simple reason.

It doesn’t work in the background because it is a free removal tool and we do it for your overall PC’s health and for the better user experience. There is no need for this product to run in the background because there are no additional and unnecessary features on the product that require running in the background.

This product runs only when you keep it open because this is how the product works. So, whenever you suspect you have malware just open Zemana AntiMalware, detect the malware and remove it. Voila, that’s it. 🙂

However, you can open it again and again as much as you want. Just keep in mind it runs only when it is opened. 🙂


Here is What Businesses Need to Know: Security Trends for 2019

2018 was a year that brought major breaches pretty much every week. So, in May, GDPR came into force as necessary means in protecting companies and their clients.

Cyber security is still an important issue that troubles business world. As it seems, businesses will need to invest more resources and energy, if they wish to stay cyber safe.

So, what can we expect to see in 2019?

1. Consumer Devices –> A Never-Ending Target

Ransomware is a known threat for companies and businesses of all types. While this trend will continue, experts believe that in 2019, there will be more and more attacks on different consumer devices.

Attackers might even target the smart TV in a house via a ransomware attack that would require a user to pay a fee to unlock it.

2. Attackers Will Become Much Smarter

Cyber criminals have seen the potential in Dark Web and they will continue exploring it even more than before. Every day, they are working hard on trying out new and more sophisticated ways of performing attacks and not getting caught.

In 2018, we have seen the beginning of a better organized cyber-crime. Attackers communicated with each other, while turning hacking tools into software-as-a-service.

With the development and implementation of AI technology, it is only a matter of time when cyber criminals will user the same technology for their malicious purposes.

3. New Job Titles Will Appear?

Many experts believe that we will soon see new job titles appearing in the companies. One of them is CCO (Chief Cybercrime Officer), whose responsibility is going to be protecting computer systems from attacks.

Employees with this title would ensure that a company/organization is ready for different types of cyber threats. They would be responsible for preventing attacks but also also take the lead if a breach did occur. They would provide a robust connection between the board and the rest of the company.

4. Continuing Cyber-Attacks Against E-Commerce Websites

In 2018, we saw waves of cyber-attacks against e-commerce websites. These attacks will continue in 2019 as well. Organized crime is going to target poorly configured and poorly secured web sites to collect customer credentials and payment card details.

5. Bigger Interest in Mobile Phones

The mobile phone will play an even greater role in our lives. It is becoming a key authentication and payment mechanism. Often, we use our phones more than desktops. We use it to check emails, for online transaction, for watching TV-shows, playing games…

Therefore, we can expect from cyber criminals a bigger interest in developing more enhanced and smarter ways of blocking our mobile devices and stealing our private data.

This image was created by and can be found at

Created by – Freepik

6. Cyber Warfare

Countries will continue to invest in attack infrastructure as they have over the past few years. The most recent US intelligence data suggests that 33 countries in the world now have cyber-attack capabilities. This is an increase compared to 2012, when there were only 12 of such countries.

It seems that cyber forces and commands have become an integral part of any nation’s armed forces, together with their intelligence apparatus.

2018 Cyber Security Overview

Christmas time is behind us and we are heading towards New Year, so we decided to take a moment, look back at 2018 and remember the major security trends:


From .exe Files to Package and Deploy Malware

One of the most significant trends we saw early 2018 is the ongoing shift away from using malicious .exe files to package and deploy malware. This changed the way in which attacks were carried out, and it posed a severe problem for traditional security solutions such as antivirus, which rely heavily on analyzing executable files in order to make detections.

Attacks that avoid the use of malicious executables started being classified as fileless. New, improved tools and strategies make it much easier for criminals to use fileless attack techniques even if they have little or no technical expertise.

Fileless attacks techniques are actively bypassing security solutions much more efficiently than traditional, file-based attacks.

Decrease in Ransomware Attacks

During the first half of 2017, there was almost nothing more common than a ransomware attack. If your company suffered a malware infection it was more likely to be ransomware than anything else.

Then, suddenly in 2018, things changed. Ransomware made room for cryptocurrency-mining malware! This provided a stealthier, more effective alternative to ransomware. Therefore, more and more attackers switched over to crypto-mining malware as a result.

Hacking Tools for Sale

One of the biggest trends in 2018 was the use of black market for purchasing numerous hacking tools and packages. Even lower skilled cyber criminals were able to utilize resources and skills which can be purchased in the black market to increase their capabilities and skills.

Ransomware-as-a-service variants have fallen in 2017, but they are more customizable, so they can be adapted to targets and thus more a threat to organizations.



The EU General Data Protection Regulation (GDPR) came into force on May 25, 2018. This regulation presents a major step in protecting personal data of European citizens. GDPR affects not only EU companies but extends to any company offering goods or services (even for free) to EU citizens or any monitoring of EU citizens.

Important new obligations under GDPR include notification of breaches within 72 hours, increased requirements in relation to consent for sharing data, storing data, processing data and transferring data as well as the ability to revoke consent. The goal was to standardize data protection laws across Europe.


Worst Cyber Security Breaches in 2018



In March 2018 reports which emerged showed that a political data firm called Cambridge Analytica collected the personal information of 50 million Facebook users via an app. Despite Cambridge Analytica’s claim that it only had information on 30 million users, Facebook determined the original estimate was in fact low. In April, the company notified 87 million members of its platform that their data had been shared.

US Universities

In March, the Department of Justice indicted nine Iranian hackers over an alleged spree of attacks on more than 300 universities in the United States and abroad. The suspects are charged with infiltrating 144 US universities, 176 universities in 21 other countries, 47 private companies, and other targets like the United Nations, the US Federal Energy Regulatory Commission, and the states of Hawaii and Indiana.

The Department of Justice says the hackers stole 31 terabytes of data, estimated to be worth $3 billion in intellectual property. The attacks used carefully crafted spear phishing emails to trick professors and other university affiliates into clicking on malicious links and entering their network login credentials. Of 100,000 accounts hackers targeted, they were able to gain credentials for about 8,000, with 3,768 of those at US institutions.


In June, a security researcher Vinny Troia discovered that Exactis, a marketing and data aggregation firm based in Florida, had left a database exposed on a publicly accessible server. The database contained two terabytes of information that included the personal details of hundreds of millions of Americans and businesses.

Exactis has not confirmed the exact number of people affected by the breach, but Troia reported that he was able to find close to 340 million individual records. He also confirmed that the incident exposed affected consumers’ email addresses, physical addresses, phone numbers, and other personal information, in some cases including extremely sensitive details like the names and genders of their children. 

Under Armour

In March, Under Armour learned that someone had gained unauthorized access to MyFitnessPal, a platform which tracks users’ diet and exercise. The criminals responsible for the breach accessed individuals’ usernames, email addresses, and hashed passwords.

150 million MyFitnessPal users are believed to have had their information compromised in the data breach.


Some Facts


  • In 2018, 4 out of 5 organizations replaced or augmented their existing antivirus solution
  • The total cost of a successful cyber-attack is over $5 million, or $301 per employee
  • 69% of organizations don’t believe their antivirus can stop the threats they’re seeing
  • In July 2018, the ratio of ransomware dropped to less than 30 percent of all malware payloads. By December, the ratio had fallen below 5 percent
  • In 2018, 54% of companies experienced one or more successful attacks that compromised data and/or IT infrastructure
  • In 2018, 77% of attacks that successfully compromised organizations in 2018 utilized fileless techniques
  • By 2020, the estimated number of passwords used by humans and machines worldwide will grow to 300 billion
  • In 2018, 150 million user accounts were compromised
  • 1n 2018, 6 million Instagram accounts were hacked
  • 35% of people use weak passwords


Stay Positive!

While risks and threats continue to grow, we shouldn’t despair! Keep in mind that the challenges cyber criminals pose, are not too great to overcome. A key part of managing them effectively is staying up-to-date on most current threats, but also stepping back to understand the big-picture trends that are driving them.

Let’s make a promise to be smarter in the following year to keep our personal information far away from criminals’ prying eyes by educating ourselves even more and protecting our devices on time!



What Is Spyware?

Spyware is a piece of software that aims to gather information about a person or an organization without their knowledge, that may send such information to another entity without the consumer’s consent, or that asserts control over a device without the consumer’s knowledge.

How Does It Work?

While the term spyware suggests software that monitors a user’s computing, the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including personal information like internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with a user’s control of a computer by installing additional software or redirecting web browsers. Some spyware can change computer settings, which can result in slow Internet connection speeds, un-authorized changes in browser settings, or changes to software settings.

You may never know you have malicious spyware on your computer, as it tends to work quietly in the background and the overt functionality and quality of the program may be very appealing. They’re often distributed as ‘shareware’ or ‘freeware’ with minimal license restrictions to trap as many people as possible.

What Is So Special About Spyware?

Such software is controversial because it can violate end users’ privacy and has the potential to be abused. For example, if a smartphone gets infected with mobile spyware that was sideloaded with a third-party app, the phone’s camera and microphone can be used to spy on a nearby activity, record phone calls, log browsing activity and keystrokes, and monitor the phone owner’s location. Its presence is typically hidden from the user and can be difficult to detect.

There are some legitimate uses of spyware. If you have a work laptop supplied by your employer, it might have a kind of spyware installed.

Some sensitive businesses like to keep tabs on the computers their staff use, and there are mainstream products which perform this function. But you should be made aware of this as part of your contract of employment, or at least in your staff security policies.

Spyware of a sort is also used for parental control programs that protect children from unsuitable internet content.

Why Did Lenovo Use Superfish?

Superfish is adware that injects adverts on to browsers in a manner somewhat like malware. Lenovo, a computer manufacturing company has been pre-installing the hidden software, which is labelled as Visual Discovery under Programs in Control Panel, on select laptops and PCs since at least last autumn.

Lenovo said it only shipped Superfish during a short window from October to December, with the purpose of helping customers potentially learn about new and interesting products while shopping. More specifically, Superfish was designed to help customers discover new products by visually analyzing images on the web to find the cheapest ones.

Due to negative feedback, and that Superfish didn’t enhance users’ experience, Lenovo has completely disabled Superfish’s server side interactions on all Lenovo products since January. That means the software is no longer active.

How To Prevent Spyware From Infecting My PC or My Phone?

To prevent spyware, users should only download software from trusted sources, read all disclosures when installing software, avoid clicking on pop-up ads and stay current with updates and patches for browser, operating system and application software.

How To Remove Spyware From a PC or a Phone?

Antivirus software that includes antispyware protection should be used to find and remove spyware. One of the best spyware remover is Zemana AntiMalware and you can download it for free (it comes with 15-days free trial). It will detect spyware on your PC and remove it.

However, if you decide to continue using the Trial and do not wish to purchase the Premium subscription at the end of the trial, your Zemana AntiMalware program will disable premium features. All other (basic) features will remain unchanged.

Zemana AntiMalware as a Spyware Removal Tool For Your PC

If you get infected with spyware, the first thing you should do is turn off your Internet connection until you are ready to clean your PC. Disconnecting your PC from the Internet connection will help prevent malware from spreading.

If you are looking for a solution that will help you in removing spyware, it is important to note that Zemana AntiMalware is compatible with any antivirus software that you might have on your PC and will run alongside it without any conflicts.

Below you can find a guide on how to detect and remove spyware  with Zemana AntiMalware.

STEP 1: Download Zemana AntiMalware here.

STEP 2: Once download, install the software on your PC. You can do this by double-clicking on ZAM program icon on your desktop or in your download files.

STEP 3: Press the ”Scan” button.

STEP 4: When the scan is complete, click “Next”.

STEP 5: Restart your computer if you are prompted to do so.

zma english UI

Zemana Mobile Antivirus as a Spyware Removal Tool For Your Android Device

Cell phone spyware has become one of the greatest threats to the privacy of your mobile data and the functioning of your mobile phone. These apps are able to access your text messages, e-mail, call history, location, and can also record your voice calls in some instances. Today, these apps can easily be installed on your phone without your consent or, more often, you install them without knowledge of all of their functions. Knowing about the presence of spyware and how to remove it is important for all end users.

If you are looking for a solution that will help you in the cell phone spyware detection and removal, you can download Zemana Mobile Antivirus.

Below you can find a guide on how to detect and remove spyware  with Zemana AntiMalware.

STEP 1: Download Zemana Mobile Antivirus here.

STEP 2: Open the UI and press the ”Full scan” button.

After the scanning, you will notified whether your mobile device is clean or not. If it is infected with spyware, you can take additional steps in removing it.

ZMA start screen

Dark Web And All You Need To Know About It

What is Dark Web?

The Dark Web is a term that refers specifically to websites that exist on an encrypted network and cannot be found by using traditional search engines or visited by using traditional browsers. Websites on the so-called Dark Web hide their identity using the Tor encryption tool. Tor renders your IP address unidentifiable and untraceable.

Not all Dark Web sites use Tor, some use similar services. But the principle remains the same. The visitor must use the same encryption tool as the site and know where to find the site, which is crucial to type in the URL and visit the site.

Here you can buy credit card numbers, all manner of drugs, guns, counterfeit money, stolen subscription credentials, or even software that helps you break into other people’s computers.

How To Access the Dark Web?

Using the Dark Web takes some doing and a certain level of technological sophistication.

The Dark Web is made up of sites that require a specialized browser (Tor browser) and protocols to access it. You cannot simply follow a link or using a search engine, which is what the majority of us are used to doing online. On Dark Web you can’t just type a URL into the average web browser and reach their intended destination.

The easy part is installing and using Tor browser. Go to and download the Tor Browser Bundle, which contains all the required tools. Run the downloaded file, choose an extraction location, then open the folder and click Start Tor Browser.

The difficult part is knowing where to look on the Dark Web. The place is as messy and chaotic, and everyone is anonymous. There’s lots of illegal activity. Dark web sites look pretty much like any other sites, but there are significant differences. One of them is the naming structure. Instead of ending in .com or .co, dark web sites end in .onion.

Some users recommend placing tape over your laptop’s webcam to prevent prying eyes watching you.

What Is The Dark Web Used For?

The Dark Web is generally used by people who are looking to procure drugs, weapons, and other illicit items, but it’s also gained notoriety as a haven of sorts for journalists and people who need to share information but can’t share it safely.

You can use the Dark Web for hiring hitmen and hackers, watching illegal videos or illegally selling photos.

Journalists use the Dark Web to share information and to receive sensitive information from anonymous whistleblowers – for example, the New York Times has a secure lockbox on the Dark Web that people can send files anonymously to. It is becoming a haven for those who need to share information safely.

Who Uses The Dark Web?

The Dark Web is used by people who want to stay anonymous and private, for whatever reason. While visiting the Dark Web can include illegal activities, there are also people using the Dark Web who are legitimately in need of anonymity because their life is in danger or the information they are in possession of is too sensitive to share publicly.

Therefore, if you are on the Dark Web, you are there because you don’t want anyone to know what you are doing or where you are.

How Can I Access The Dark Web On An Android?

What you need to do is download applications that will enable you to connect to Tor browser. Two most common ones are Orfox and Orbot. Orbot allows you to connect to TOR and runs in the background while Orfox is the browser that you’ll use to navigate. You can download them from Google Play.

When you connect to the Dark Web with Orbot,  you can use Orfox for browsing around.

Before you go to the Dark Web, make sure that you’ve downloaded and installed some decent antivirus software. Zemana Mobile Antivirus will protect you from all types of viruses and malware. You can get it here.