AOL is letting users test a new security tool that analyzes their PCs and home networks and alerts them about gaps that could leave them vulnerable to viruses, worms, spyware and other threats.The tool, called Active Security Monitor, evaluates the security software and settings on users’ PCs and based on that delivers an overall security rating, along with recommendations for improvement, AOL said on Friday on its Beta Central site.AOL developed Active Security Monitor because to properly protect a PC, users need to install, configure and maintain a variety of software programs, such as firewalls, antivirus and antispyware applications, and it can be complicated to keep track of all of them.“If you don’t have the right programs installed and correctly configured, your system is vulnerable to attack. This is where Active Security Monitor comes in,” reads the Frequently Asked Questions webpage of the Active Security Monitor beta program. Among other things, Active Security Monitor checks antivirus and antispyware programs, firewalls, operating system updates and Web browser settings.Active Security Monitor can be downloaded for free. AOL didn’t immediately respond to a request seeking comment.For related coverage, read Spyware Operation Stopped by FTC.Keep checking in at our Security Feed page, or subscribe via RSS, for updated news coverage.— Juan Carlos Perez, IDG News Service Related content feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Intrusion Detection Software Intrusion Detection Software feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe