How Valuable is Your Email Account to Hackers?

hacked email account_HEADER

Your email archive is full of information that’s valuable to you—and to cybercriminals.

The combination of plentiful email storage and relaxed password practices enable criminals to do their worst. Many Web-based email systems now offer multiple gigabytes of storage for free. For example, Google gives you 15GB to share across Gmail, Google Drive, and other Google services. With all that free storage, you may be using your email account as a kind of searchable archive of important data. And you probably don’t delete messages that you might have erased in the past. With gigabytes of storage, why bother? You may need those messages for reference later.
Continue Reading… How Valuable is Your Email Account to Hackers?

The Advantages and Disadvantages of the Internet

pros and cons_header

Technology can be defined as applications, instruments, or processes that enhance or simplify the aspects of everyday life. The vehicle you use to drive to work is an example of technology that simplifies life. Or, the Internet, as a whole, can be seen as technology that has greatly enhanced our lives. While the introduction of the Internet led to many benefits, unfortunately, it also came with its own set of problems. Most significantly, these problems can negatively impact your security and privacy.
Continue Reading… The Advantages and Disadvantages of the Internet

How Secure is Your WiFi-Enabled Camera?

eye in camera_header

In this day and age, digital cameras such as still image and video recording cameras, home surveillance devices, and baby monitors all come with WiFi capabilities. While there are benefits of WiFi-enabled cameras, unfortunately, there’s also the potential for security concerns. For example, just in November 2014, the BBC reported that a Russian website displayed live feeds from private webcams, baby monitors, and CCTV systems from more than 250 countries to prove how easy it can be for attackers to access these cameras.
Continue Reading… How Secure is Your WiFi-Enabled Camera?

7 Ways to Stay Secure This New Year

7 ways to stay secure this new year_2015 counter_header

The New Year means a fresh start for many people. For some, their attempt at this new journey begins by creating a list of resolutions.

As time progresses, many people find that some items on their New Year’s resolution lists get pushed back or even ignored. While it might be acceptable to postpone certain items on your list, security is definitely something you cannot afford to put on the backburner. If you neglect your security, it could lead you down the path of a not-so happy year.
Continue Reading… 7 Ways to Stay Secure This New Year

Who is Really on the Other End of the Line? Beware of Fake Support Scams!

WINDOWS TECH SUPPORT SCAM_header

Your phone rings. The caller ID says ‘Windows Support,’ so you answer.

“Hi,” the caller says, giving a name. “I’m calling from Windows support. We’ve been receiving some error messages from your computer.” The caller says he can fix those errors if you give him remote access to your computer. You’re worried, so you agree.
Continue Reading… Who is Really on the Other End of the Line? Beware of Fake Support Scams!