Skip to main content

The Latest

  • USB Drives have serious Security Flaws
    USB Drives have serious Security Flaws
    That little thing that you stick in your computer to store or transfer data can also mean very bad news.The USB device or “flash drive” can be reconfigured to work like a little thief, for instance, being made to mimic a keyboard and...
  • What to do in the Aftermath of an Attack
    What to do in the Aftermath of an Attack
    Can you hack cleaning up the mess a hacker makes after infiltrating your computer? Would you even know the first thing to do? And yes, YOU’RE computer CAN be hacked.After the attack, locate the portal through which the crumb-bag entered....
  • Malware and Phishing Warnings in Chrome Browser to be changed by Google
    Malware and phishing warnings in Chrome browser to be changed by Google
    Google normally displays a malware and phishing warning in the Chrome browser. There are plans, though, to alter the display. Currently it’s a white warning against a red background. The new display will be an entirely red page, with a big X...
  • Best Way to Destroy a Computer Virus
    Best Way to Destroy a Computer Virus
    Computer viruses are here to stay, which means users need to know the best way to eradicate them the moment they attack. Like disease viruses, computer viruses evolve and get “smarter.” The many different kinds of computer viruses ...
  • How to tell if your Computer has a Virus
    How to tell if your Computer has a Virus
    Your computer probably has a virus if you can answer “Yes” to any of the questions below:Is your computer running quite slowly?A virus often causes a computer to run slowly. But realize that this symptom can also mean that a computer...
  • UPS stores becomes the latest victim of hackers
    UPS stores becomes the latest victim of hackers
    According to a report by the Associated Press 51 UPS (United Parcel Service) stores in 24 states suffered security breaches that compromised the personal data of around 100,000 customers over a 7 ½ period. The United States Department of...
  • The Role of Antivirus Software
    The Role of Antivirus Software
    The purpose of antivirus (AV) software is to detect, neutralize or eradicate malware (malicious software).AV software not only will identify and destroy the computer virus, but it’s also designed to fight off other kinds of threats such as...
  • Before Getting Rid of Your Old Printer, Say “Goodbye” to Lingering Data
    Before Getting Rid of Your Old Printer, Say “Goodbye” to Lingering Data
    In the security business, there’s a lot of talk about protecting your smartphones and computers from malware and viruses, as well as loss and theft. It makes sense. Most of us use our smartphones and computers on a daily basis and keep...
  • I've been hacked, now what?
    I've been hacked, now what?
    You’re not special; a hacker CAN get into your computer or smartphone. Would you know how to clean up this mess?Start by locating the portal through which the hacker got in such as a browser, emal program. Next, disconnect/uninstall this...
  • 10 Tips to Stay Safe Online
    10 Tips to Stay Safe Online
    Hang ten, dude! It’s summertime and surfers are taking to the ocean to go catch some gnarly waves. Experienced surfers know that there are dangers out in the water and are trained to look out for them. These dangers include rip currents,...
  • Business Identity Theft; Big Brands, Big Problems
    Business Identity Theft; Big Brands, Big Problems
    Cyber criminals go after brand names like vultures, infiltrating company websites, hijacking mobile applications and tainting online ads, among other tricks.Some corporate websites aren’t as secure as business leaders think they are&mdash...
  • Malware Can Hide in the Most Obvious Places
    Malware Can Hide in the Most Obvious Places
    You never know when malware will bite. Even browsing an online restaurant menu can download malicious code, put there by hackers.Much has been said that Target’s hackers accessed the giant’s records via its heating and cooling system....
  • Stubhub hackers caught
    Stubhub hackers caught
    On Wednesday authorities wrapped up an 8 month long investigation into a hacking attack on the popular ticket exchange site Stubhub. The international investigation resulted a total of 10 people in New York, London and Toronto. 6 of the 10...
  • Most Toxic Superhero 2014
    Most Toxic Superhero 2014
    It’s a bird! It’s a plane! It’s Superman! Yes, this superhero might be the epitome of courage, justice, and strength, but he might also be the biggest threat to you online.We’ve entered a new age of superheroes. No longer...
  • What is an Advanced Persistent Threat?
    What is an Advanced Persistent Threat?
    If you’ve ever seen a movie where the bad guys are using ongoing, invasive hacking to spy on their “enemy,” you have some familiarity with an advanced persistent threat (APT).This term usually refers to an attack carried out by a...