Skip to main content

The Latest

  • Powerful malware has been infecting US government software since 2011
    Powerful malware has been infecting US government software since 2011
    The Department of Homeland Security released some alarming news on Friday. The federal agency revealed that government computers have software that has been infected with malware and that the threat that lies in being hacked is very real....
  • What is Browser Hijacking?
    What is Browser Hijacking?
    Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed or check out The Financial Times but your homepage is now some weird search engine you’ve never seen before. Guess what? You’ve been hijacked.Browser...
  • Both Dairy Queen and Kmart suffer hacking attacks
    Both Dairy Queen and Kmart suffer hacking attacks
    According to reports by ABCNews and the Associated Press, both Dairy Queen and Kmart have become the latest two victim of the point-of-sale hackers. On Thursday it was spokespeople from the fastfood chain that 395 establishment had suffered a...
  • 5 Reasons why You will get Hacked
    5 Reasons why You will get Hacked
    Don’t be part of the “I’ll never get hacked” camp. Do you really think it won’t happen to you? If so, it’s:Because you think no phishing e-mail could get past your radar. Just because you can spot a Nigerian...
  • Tonight’s Special Guest: McAfee’s Most Dangerous Celebrity of 2014
    Tonight’s Special Guest: McAfee’s Most Dangerous Celebrity of 2014
    After a long day of hard work, there’s nothing like coming home, throwing on some PJs, and watching some good old late night television. I love catching up on all the latest news and watching celebrities like Kaley Cuoco-Sweetin discuss the...
  • USB Drives have serious Security Flaws
    USB Drives have serious Security Flaws
    That little thing that you stick in your computer to store or transfer data can also mean very bad news.The USB device or “flash drive” can be reconfigured to work like a little thief, for instance, being made to mimic a keyboard and...
  • What to do in the Aftermath of an Attack
    What to do in the Aftermath of an Attack
    Can you hack cleaning up the mess a hacker makes after infiltrating your computer? Would you even know the first thing to do? And yes, YOU’RE computer CAN be hacked.After the attack, locate the portal through which the crumb-bag entered....
  • Malware and Phishing Warnings in Chrome Browser to be changed by Google
    Malware and phishing warnings in Chrome browser to be changed by Google
    Google normally displays a malware and phishing warning in the Chrome browser. There are plans, though, to alter the display. Currently it’s a white warning against a red background. The new display will be an entirely red page, with a big X...
  • Best Way to Destroy a Computer Virus
    Best Way to Destroy a Computer Virus
    Computer viruses are here to stay, which means users need to know the best way to eradicate them the moment they attack. Like disease viruses, computer viruses evolve and get “smarter.” The many different kinds of computer viruses ...
  • How to tell if your Computer has a Virus
    How to tell if your Computer has a Virus
    Your computer probably has a virus if you can answer “Yes” to any of the questions below:Is your computer running quite slowly?A virus often causes a computer to run slowly. But realize that this symptom can also mean that a computer...
  • UPS stores becomes the latest victim of hackers
    UPS stores becomes the latest victim of hackers
    According to a report by the Associated Press 51 UPS (United Parcel Service) stores in 24 states suffered security breaches that compromised the personal data of around 100,000 customers over a 7 ½ period. The United States Department of...
  • The Role of Antivirus Software
    The Role of Antivirus Software
    The purpose of antivirus (AV) software is to detect, neutralize or eradicate malware (malicious software).AV software not only will identify and destroy the computer virus, but it’s also designed to fight off other kinds of threats such as...
  • Before Getting Rid of Your Old Printer, Say “Goodbye” to Lingering Data
    Before Getting Rid of Your Old Printer, Say “Goodbye” to Lingering Data
    In the security business, there’s a lot of talk about protecting your smartphones and computers from malware and viruses, as well as loss and theft. It makes sense. Most of us use our smartphones and computers on a daily basis and keep...
  • I've been hacked, now what?
    I've been hacked, now what?
    You’re not special; a hacker CAN get into your computer or smartphone. Would you know how to clean up this mess?Start by locating the portal through which the hacker got in such as a browser, emal program. Next, disconnect/uninstall this...
  • 10 Tips to Stay Safe Online
    10 Tips to Stay Safe Online
    Hang ten, dude! It’s summertime and surfers are taking to the ocean to go catch some gnarly waves. Experienced surfers know that there are dangers out in the water and are trained to look out for them. These dangers include rip currents,...