Skip to main content

The Latest

  • Mobile Apps Failing Security Tests
    Mobile Apps Failing Security Tests
    It’s been said that there are over a million different apps for the smartphone. Well, however many may exist, know that not all of them are passing security tests with flying colors.You may already be a user of at least several of the 25...
  • What is a Remote Administration Tool (RAT)?
    What is a Remote Administration Tool (RAT)?
    Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I smell a rat. Literally, a RAT.A RAT or remote administration tool, is software that gives a person full control a tech device, remotely....
  • Is Lenovo installing adware/malware on new computers?
    Lenovo denies installing malware on new computers
    The tech internet is all abuzz with the disclosure that Lenovo installs Superfish on new computers they ship."Malware" the internet screams.Not so fast, Lenovo responds.Lenovo says it is doing nothing of the kind and that Superfish is...
  • How to Spot a Splog
    How to Spot a Splog
    I really enjoy reading blogs. And since you are here, reading my blog post, I’m guessing you do too. Blogs are a great way of gaining information and learning about different perspectives on a wide variety of topics. Unfortunately, spammers...
  • What is a Rootkit?
    What is a Rootkit?
    A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit would be a burglar breaking into your house. The burglar is dressed all in black, so that his form blends into the darkness. He...
  • Hacking 2015 and Beyond
    Hacking 2015 and Beyond
    2015 brings us no closer to putting the lid on hackers as any other year has. The crime of Criminal hacking will prove to be as big as ever in the new year. Here’s what we have to look forward too:Bank Card Breaches There will always be the...
  • Ransomware
    Responding to ransomware: To pay or not to pay a ransom for your data
    A recent Kim Kommando article offered some curious advice about ransomware, a malicious software app that threatens to destroy all your data if you do not pay a ransom fee. She suggests that there may be instances when the best thing to do if your...
  • Powerful malware has been infecting US government software since 2011
    Powerful malware has been infecting US government software since 2011
    The Department of Homeland Security released some alarming news on Friday. The federal agency revealed that government computers have software that has been infected with malware and that the threat that lies in being hacked is very real....
  • What is Browser Hijacking?
    What is Browser Hijacking?
    Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed or check out The Financial Times but your homepage is now some weird search engine you’ve never seen before. Guess what? You’ve been hijacked.Browser...
  • Both Dairy Queen and Kmart suffer hacking attacks
    Both Dairy Queen and Kmart suffer hacking attacks
    According to reports by ABCNews and the Associated Press, both Dairy Queen and Kmart have become the latest two victim of the point-of-sale hackers. On Thursday it was spokespeople from the fastfood chain that 395 establishment had suffered a...
  • 5 Reasons why You will get Hacked
    5 Reasons why You will get Hacked
    Don’t be part of the “I’ll never get hacked” camp. Do you really think it won’t happen to you? If so, it’s:Because you think no phishing e-mail could get past your radar. Just because you can spot a Nigerian...
  • Tonight’s Special Guest: McAfee’s Most Dangerous Celebrity of 2014
    Tonight’s Special Guest: McAfee’s Most Dangerous Celebrity of 2014
    After a long day of hard work, there’s nothing like coming home, throwing on some PJs, and watching some good old late night television. I love catching up on all the latest news and watching celebrities like Kaley Cuoco-Sweetin discuss the...
  • USB Drives have serious Security Flaws
    USB Drives have serious Security Flaws
    That little thing that you stick in your computer to store or transfer data can also mean very bad news.The USB device or “flash drive” can be reconfigured to work like a little thief, for instance, being made to mimic a keyboard and...
  • What to do in the Aftermath of an Attack
    What to do in the Aftermath of an Attack
    Can you hack cleaning up the mess a hacker makes after infiltrating your computer? Would you even know the first thing to do? And yes, YOU’RE computer CAN be hacked.After the attack, locate the portal through which the crumb-bag entered....
  • Malware and Phishing Warnings in Chrome Browser to be changed by Google
    Malware and phishing warnings in Chrome browser to be changed by Google
    Google normally displays a malware and phishing warning in the Chrome browser. There are plans, though, to alter the display. Currently it’s a white warning against a red background. The new display will be an entirely red page, with a big X...