Archive for 'Security'

How Private is Your Information on Social Media?

How Private is Your Information on Social Media?

Is your private information really private if you use social media? Not really, as it turns out. Over the last few months, the media has been flooded with stories about privacy hacks and breaches within the major social media platforms—often by the social media companies themselves! The most recent problem and breach of privacy to […]

Full Story

Yahoo Email Suspicious Activity becoming the Norm

Yahoo Email Suspicious Activity becoming the Norm

Have you been notified by Yahoo due to suspicious activity on your email account? I am sure you have and it’s becoming far to frequent in the last year.  I have two accounts and I get notifications at least every other month about usual or suspicious activity on my email account. I have yet to […]

Full Story

Court Notice to Appear Scam

Court Notice to Appear Scam

There’s an email purporting to be from a court, claiming that the recipient appear on the date and time indicated in the email. This email has an attachment notification that is harmful to the user’s computer if the file is downloaded and extracted. The zip file is loaded with a Malware executable. The email is […]

Full Story

Target and Michaels Credit Card Breach – What You Need to Know

Target and Michaels Credit Card Breach – What You Need to Know

Many of you heard about the credit card breach at Target and most recently Michaels the Arts and Crafts store. The good news, if there’s good news is that many banks, not all, offer free protection for credit cards and debit cards. Thank god my bank Chase is one of them. Online crimes are at […]

Full Story

Why E-Cards are Dangerous

Why E-Cards are Dangerous

It’s easy, it’s affordable but it is also a playground where cyber crooks love to play. It’s an easy way to engineer a scam by playing on people’s feelings. The holidays are upon us and it’s also the busiest time for cyber crooks to brew up their next scam. E-cards (or electronic greeting cards) have […]

Full Story

Policy Department Phishing Scam On The Loose!

Policy Department Phishing Scam On The Loose!

There’s an email or emails claiming “Your Auto-Coverage Policy Is Undergoing Changes.” This email is out to steal personal identifiable information to be sold to 3rd party companies or to be used to steal your identity. In any case, the email is a scam. When you click on the link in the email it takes […]

Full Story

Locking Down Your Network – When Part of the Network Is You

Locking Down Your Network – When Part of the Network Is You

Maintaining network security is challenging.  A constant stream of threats keep IT security professionals on their toes and developers busy anticipating and finding ways to block the next attack. And the new wave of wearable computing devices, such as Google Glass, is compounding the challenges that security teams face in protecting their networks and data. […]

Full Story

Cloud Versus Server: Which Is Safer?

Cloud Versus Server: Which Is Safer?

It’s one of the biggest questions in computing right now: is it safer to store your files and other important information on your own server, or on the cloud? The answer isn’t that simple. At present, cloud security and server security are practically neck-and-neck in terms of which one is going to keep your data […]

Full Story

Beware of Misleading Pet Insurance Coverage

Beware of Misleading Pet Insurance Coverage

We love our dogs and cats like one of our own and having pet insurance can ease the burden of expensive veterinary bills unless you’re insured by Trupanion. We lost our dog Bella on August 31, 2013 and it has been very tough dealing with the loss of our baby. To make things worse, we […]

Full Story

Cross Platform Security Threats Are More Dangerous Than You Think

Cross Platform Security Threats Are More Dangerous Than You Think

Most online security advocates place emphasis on DDoS, malware, viruses, ransomware and APT attacks, but merely highlight the dangers of cross platform vulnerabilities. However, there has recently been a rise in the number of hackers writing same vulnerability codes across different platforms – as they consider it a smart business. The cross-platform malware can also […]

Full Story

5 Interesting Facts About The Technology That Keeps Your Information Safe Online

5 Interesting Facts About The Technology That Keeps Your Information Safe Online

Online crimes, with a focus on identity theft, are some of the fastest growing crimes in the world and affect millions of people every single year. With international security companies racing to keep ahead of the criminals, those that use the internet may want to take a look at these five interesting facts about the […]

Full Story

6 Simple Email Security Tips Anyone Can Implement Today

6 Simple Email Security Tips Anyone Can Implement Today

Internet security can take many forms.  The key is assessing risk and identifying which online activities pose the most significant threat.  Anyone with an e-mail address is exposed to a variety of Internet security threats including malware, phishing, and spyware.  E-mail scams have become increasingly complex and more difficult to spot.  Fortunately, there are a […]

Full Story