Archive for 'Security'

WiFi Dangers and What You Need to Know

WiFi Dangers and What You Need to Know

Most people don’t understand the risks associated with connecting to a public or free WiFi network. In fact, some people don’t even care about the dangers and continue to do whatever they want despite what dangers are already documented. Here’s a short list from Sophos web site: A US trio who attacked companies by wardriving […]

Full Story

Google Adsense Disabled – WTF?

Google Adsense Disabled – WTF?

I was an Adsense publisher for almost 7 years and last month my revenue tripled with no uptick in traffic that would suggest why my revenue was up. Guess what? My account was disabled. Google advised me that my Adsense account was disabled due to invalid click activity. See the actual message below. Account Disabled […]

Full Story

How to Keep Your Data Safe from Hackers

How to Keep Your Data Safe from Hackers

Data breaches have become a real problem in the past few years. Giant corporations such as Michael’s, Target and even Bank of America have all had their issues with hackers stealing data from systems that were thought to be secure. With more and more of the world getting (and staying) online, these sorts of data […]

Full Story

Facebook Fake Friend Request Scam

Facebook Fake Friend Request Scam

Hackers could be re-purposing your information including photos and bio information and creating bogus accounts using your name structured a little different. The hackers than start sending friend requests to your friends because they know at first glance your friends will accept the friend request. Hackers are getting smarter and more strategic in stealing your […]

Full Story

New Malware Found in Android

New Malware Found in Android

Android is the dominant mobile operating system in the world. This also makes it a preferred target for hackers and people who want to steal your information. Over the years Android has taken certain steps to make sure that its core functionality remains secure and that the user data on the phone is protected. However, […]

Full Story

New Security Threat Exposed by Media

New Security Threat Exposed by Media

Now that the media has warned you about what could happen the next 2 weeks with security breaches on a user’s computer, they also gave Cyber Criminals a head start. Why would you even call out something so significant? Why not let the manufacturers of antivirus and anti-malware software do their job with silent updates […]

Full Story

The Dangers of Counterfeit Electronics and How to Avoid Them

The Dangers of Counterfeit Electronics and How to Avoid Them

It sounds like something out of a Hollywood blockbuster: A military fighter jet mechanic discovers a part on a plane that isn’t quite right. Upon further investigation, officials discover that the computer chip, a piece no bigger than an inch square, is not in fact the military-grade advance technology that was touted by the manufacturer, […]

Full Story

Windows XP Support’s End Can Be A Hackers Playground

Windows XP Support’s End Can Be A Hackers Playground

Windows XP was released by Microsoft back in 2001. Though the company has come out with various new operating systems since then, many computer users have chosen to stay with Windows XP. In fact, estimates are that this popular operating is still used on around one third of all computers around the world. Even in […]

Full Story

Malicious Apps: What They Really Do

Malicious Apps: What They Really Do

If your employees use mobile devices for work — their own or corporate-supplied — there’s a good chance that you’ve heard about malicious applications and the potential dangers they pose to businesses. There have been multiple studies showing that even applications from trusted sources can contain malware and the risk of infection increases in BYOD […]

Full Story

Not Every Threat To Your Data Is Invisible

Not Every Threat To Your Data Is Invisible

In the last ten years or so, a wide variety of threats to computer data has been identified and addressed. Viruses, Trojans, hackers, and many other enemies have emerged and been battled. In addition, damaged or failed hard drives have been circumvented by better repair techniques and external storage like the Cloud. Lost in all […]

Full Story

How Private is Your Information on Social Media?

How Private is Your Information on Social Media?

Is your private information really private when you use social media? Not really, as it turns out. Over the last few months, the media has been flooded with stories about privacy hacks and breaches within the major social media platforms—often by the social media companies themselves! The most recent problem and breach of privacy to […]

Full Story

Yahoo Email Suspicious Activity becoming the Norm

Yahoo Email Suspicious Activity becoming the Norm

Have you been notified by Yahoo due to suspicious activity on your email account? I am sure you have and it’s becoming far to frequent in the last year.  I have two accounts and I get notifications at least every other month about usual or suspicious activity on my email account. I have yet to […]

Full Story