Archive by Author

Facebook Fake Friend Request Scam

Facebook Fake Friend Request Scam

Hackers could be re-purposing your information including photos and bio information and creating bogus accounts using your name structured a little different. The hackers than start sending friend requests to your friends because they know at first glance your friends will accept the friend request. Hackers are getting smarter and more strategic in stealing your […]

Full Story

New Security Threat Exposed by Media

New Security Threat Exposed by Media

Now that the media has warned you about what could happen the next 2 weeks with security breaches on a user’s computer, they also gave Cyber Criminals a head start. Why would you even call out something so significant? Why not let the manufacturers of antivirus and anti-malware software do their job with silent updates […]

Full Story

Not Every Threat To Your Data Is Invisible

Not Every Threat To Your Data Is Invisible

In the last ten years or so, a wide variety of threats to computer data has been identified and addressed. Viruses, Trojans, hackers, and many other enemies have emerged and been battled. In addition, damaged or failed hard drives have been circumvented by better repair techniques and external storage like the Cloud. Lost in all […]

Full Story

How Private is Your Information on Social Media?

How Private is Your Information on Social Media?

Is your private information really private when you use social media? Not really, as it turns out. Over the last few months, the media has been flooded with stories about privacy hacks and breaches within the major social media platforms—often by the social media companies themselves! The most recent problem and breach of privacy to […]

Full Story

Yahoo Email Suspicious Activity becoming the Norm

Yahoo Email Suspicious Activity becoming the Norm

Have you been notified by Yahoo due to suspicious activity on your email account? I am sure you have and it’s becoming far to frequent in the last year.  I have two accounts and I get notifications at least every other month about usual or suspicious activity on my email account. I have yet to […]

Full Story

Court Notice to Appear Scam

Court Notice to Appear Scam

There’s an email purporting to be from a court, claiming that the recipient appear on the date and time indicated in the email. This email has an attachment notification that is harmful to the user’s computer if the file is downloaded and extracted. The zip file is loaded with a Malware executable. The email is […]

Full Story

Target and Michaels Credit Card Breach – What You Need to Know

Target and Michaels Credit Card Breach – What You Need to Know

Many of you heard about the credit card breach at Target and most recently Michaels the Arts and Crafts store. The good news, if there’s good news is that many banks, not all, offer free protection for credit cards and debit cards. Thank god my bank Chase is one of them. Online crimes are at […]

Full Story

5 Reasons for Jailbreaking your iPhone & iPad iOS 7

5 Reasons for Jailbreaking your iPhone & iPad iOS 7

There is a saying which is, you may have ten reasons for not doing something but you only need one right reason for doing something. In this post we will give you five good reasons for you to jailbreaking your smart iPhone and iPad not just one! Let’s get talking about them without much adieu… […]

Full Story

Why E-Cards are Dangerous

Why E-Cards are Dangerous

It’s easy, it’s affordable but it is also a playground where cyber crooks love to play. It’s an easy way to engineer a scam by playing on people’s feelings. The holidays are upon us and it’s also the busiest time for cyber crooks to brew up their next scam. E-cards (or electronic greeting cards) have […]

Full Story

Policy Department Phishing Scam On The Loose!

Policy Department Phishing Scam On The Loose!

There’s an email or emails claiming “Your Auto-Coverage Policy Is Undergoing Changes.” This email is out to steal personal identifiable information to be sold to 3rd party companies or to be used to steal your identity. In any case, the email is a scam. When you click on the link in the email it takes […]

Full Story

Locking Down Your Network – When Part of the Network Is You

Locking Down Your Network – When Part of the Network Is You

Maintaining network security is challenging.  A constant stream of threats keep IT security professionals on their toes and developers busy anticipating and finding ways to block the next attack. And the new wave of wearable computing devices, such as Google Glass, is compounding the challenges that security teams face in protecting their networks and data. […]

Full Story

Cloud Versus Server: Which Is Safer?

Cloud Versus Server: Which Is Safer?

It’s one of the biggest questions in computing right now: is it safer to store your files and other important information on your own server, or on the cloud? The answer isn’t that simple. At present, cloud security and server security are practically neck-and-neck in terms of which one is going to keep your data […]

Full Story