Malware is everywhere. You can get infected by opening up a rigged attachment in your email, or by visiting a booby-trapped website that automatically downloads malware on to your computer. Once infected, your computer can turn into a zombie, being remotely controlled by criminals to attack other computers. Criminals may steal your personal data or use your computer for nefarious activity.
While you need to take precautions to prevent getting infected in the first place, such as running an up-to-date security software, it’s also important to know how malware works and how they spread. There is a lot of misinformation out there, so here are some of the myths about malware you shouldn’t believe.
Continue Reading… Five Myths About Malware You Need to Know
It’s exciting to see a Friend Request at the top of your Facebook page. You’re likely to accept Friend Requests without thinking twice, especially if it’s a friend or a name you recognize. You may even be thinking that there’s no real harm in accepting all Friend Requests that come your way. Having more friends means you’re more popular…right?
Continue Reading… Don’t Be Too Quick to Accept That Friend Request!
It’s easier than ever to set up a wireless network. Plop in a WiFi router and connect to a DSL or cable modem, or if you are one of the lucky ones, with a FiOS box. But before you start online banking, shopping, and surfing the Web, make sure your network is secure from intruders.
Continue Reading… How to Secure Your WiFi Network
Anyone who has ever used the Internet has looked up at their browser’s address bar and noticed a series of letters that either looks like this ‘HTTP’, or like this ‘HTTPS’. At first glance, it may seem like it’s just the letter S. In reality though, it is much more complicated than that.
Continue Reading… HTTPS: The S is More Than Just a Letter
Social engineering is sneaky, as it takes advantage of our natural tendency to be helpful. Social engineers can also play upon human emotions, such as fear and sympathy. Here are some tricks social engineers employ to trick you out of sensitive data, and how you can protect yourself.
Continue Reading… Beware of Social Engineering, a Scam Artist’s Favorite Tool