Trusty Tips for Safer Tech Toy Shopping in 2015

Toys toys toysLooking for the perfect holiday gift for the kids in your life? How about a fuzzy knit sweater? Too itchy. A pair of mittens? They’ve probably got dozens. Some peppermint chocolates? Just think of the cavities.

When it comes to gift-giving in 2015, the magic word for both givers and receivers this year is technology. Kids and adults alike are pining for new technological gadgets that can do things most of us never dreamed of in holiday seasons of the past. Read more…

Top 9 Security Features We’re Thankful for This Thanksgiving

Happy Thanksgiving

 

It’s almost Thanksgiving, and regardless of whether or not you celebrate the occasion, now is a great time to sit back and reflect on all the goodness and bounty we have in our tech-filled lives. Think about it. Just 10 years ago, iPhones were still two years away, Uber was a German word, and you could only use Facebook if you had aced the SAT’s and got yourself into Harvard.

Read more…

6 Foolproof Ways to Avoid Falling Prey to Social Engineering

Don't be a victim of Social Engineering. Awareness is your #1 source of protection.

 

Social Engineering is a pretty hot topic nowadays. It seems like every time you turn around there is another story about a major corporation, important person or institution whose data has been compromised. Often, these hacks began with an email that shouldn’t have been opened, or the revealing of information that should never have been told.

No, these attacks are not the brainchild of some evil tech genius, cranking out infected code and overrunning systems with malware. Rather, they are the results of an art that dates back as far as human existence, when the first cave man convinced the second cave man that it was entirely worthwhile to trade his woolly mammoth for a handful of rocks.

Read more…

5 Tricks To Avoid On Halloween. Your PC Security Depends On It.

 

It’s fun to be scared by frightening costumes and pranks at Halloween. Heck, who DOESN’T like a good DIY zombie get-up? But one thing that’s definitely NOT fun is being hit by a real-life cybercriminal who is trying to hack into your PC or steal your identity.

After all, ghosts, witches, and haunted houses are one thing. Having your PC turned into a zombie, your email hacked by a cybercriminal, or all the data on your computer held ransom by a cyber con artist – well that’s something altogether different.

Read more…

Are You A Hack Waiting to Happen?

Are You A Hack Waiting to Happen?

 

National Cyber Security Awareness Month (in the US) and European Cyber Security Month (in Europe) are coming to an end, which makes this the perfect time to double and triple check your cyber safety. Do you approach your use of the internet with a grain salt or are you reckless? Are you doing all you can to protect yourself from online trouble or are you just a hack waiting to happen?

Read the statements below and make 100% sure that they don’t describe your online behavior. If just ONE of them rings familiar, then it’s time to change your online behavior ASAP. Your personal privacy and security depends on it.

 

Read more…