Archive by Author

How Private is Your Information on Social Media?

How Private is Your Information on Social Media?

Is your private information really private if you use social media? Not really, as it turns out. Over the last few months, the media has been flooded with stories about privacy hacks and breaches within the major social media platforms—often by the social media companies themselves! The most recent problem and breach of privacy to […]

Full Story

Yahoo Email Suspicious Activity becoming the Norm

Yahoo Email Suspicious Activity becoming the Norm

Have you been notified by Yahoo due to suspicious activity on your email account? I am sure you have and it’s becoming far to frequent in the last year.  I have two accounts and I get notifications at least every other month about usual or suspicious activity on my email account. I have yet to […]

Full Story

Court Notice to Appear Scam

Court Notice to Appear Scam

There’s an email purporting to be from a court, claiming that the recipient appear on the date and time indicated in the email. This email has an attachment notification that is harmful to the user’s computer if the file is downloaded and extracted. The zip file is loaded with a Malware executable. The email is […]

Full Story

Target and Michaels Credit Card Breach – What You Need to Know

Target and Michaels Credit Card Breach – What You Need to Know

Many of you heard about the credit card breach at Target and most recently Michaels the Arts and Crafts store. The good news, if there’s good news is that many banks, not all, offer free protection for credit cards and debit cards. Thank god my bank Chase is one of them. Online crimes are at […]

Full Story

5 Reasons for Jailbreaking your iPhone & iPad iOS 7

5 Reasons for Jailbreaking your iPhone & iPad iOS 7

There is a saying which is, you may have ten reasons for not doing something but you only need one right reason for doing something. In this post we will give you five good reasons for you to jailbreaking your smart iPhone and iPad not just one! Let’s get talking about them without much adieu… […]

Full Story

Why E-Cards are Dangerous

Why E-Cards are Dangerous

It’s easy, it’s affordable but it is also a playground where cyber crooks love to play. It’s an easy way to engineer a scam by playing on people’s feelings. The holidays are upon us and it’s also the busiest time for cyber crooks to brew up their next scam. E-cards (or electronic greeting cards) have […]

Full Story

Policy Department Phishing Scam On The Loose!

Policy Department Phishing Scam On The Loose!

There’s an email or emails claiming “Your Auto-Coverage Policy Is Undergoing Changes.” This email is out to steal personal identifiable information to be sold to 3rd party companies or to be used to steal your identity. In any case, the email is a scam. When you click on the link in the email it takes […]

Full Story

Locking Down Your Network – When Part of the Network Is You

Locking Down Your Network – When Part of the Network Is You

Maintaining network security is challenging.  A constant stream of threats keep IT security professionals on their toes and developers busy anticipating and finding ways to block the next attack. And the new wave of wearable computing devices, such as Google Glass, is compounding the challenges that security teams face in protecting their networks and data. […]

Full Story

Cloud Versus Server: Which Is Safer?

Cloud Versus Server: Which Is Safer?

It’s one of the biggest questions in computing right now: is it safer to store your files and other important information on your own server, or on the cloud? The answer isn’t that simple. At present, cloud security and server security are practically neck-and-neck in terms of which one is going to keep your data […]

Full Story

Beware of Misleading Pet Insurance Coverage

Beware of Misleading Pet Insurance Coverage

We love our dogs and cats like one of our own and having pet insurance can ease the burden of expensive veterinary bills unless you’re insured by Trupanion. We lost our dog Bella on August 31, 2013 and it has been very tough dealing with the loss of our baby. To make things worse, we […]

Full Story

WigWag’s Sensor System for Programmable Home Automation

WigWag’s Sensor System for Programmable Home Automation

While smart home devices and automation systems seem like nifty ideas, cost and the steep learning curve are two hindering factors. As technological advancement proceeds further, the development of simple plug n play models that can literally revolutionize the industry are coming onto the front. With smart devices equipped with intuitive control, the cost and learning […]

Full Story

3 Most Common Categories of DDoS Attacks

3 Most Common Categories of DDoS Attacks

The nature of DDoS attacks (Distributed Denial-of-Service Attack) has grown increasingly complex over the past 3 years.  In the past, the DDoS attacks were only associated with the brute force strategy designed to consume maximum amounts of bandwidth.  Since then, a variety of new tools have become readily available.  Not only has this allowed for […]

Full Story