‘Tis the time of year for eggnog and holiday tales. Here is a holiday story for you to be mindful of when browsing online.
When searching for something on the Web, most people type in a few keywords into a search engine, such as Yahoo!, Google, or Bing and press enter. And by the magic of the Internet, you’re presented with a list of results within a fraction of a second.
Continue Reading… It’s the Most Wonderful Time… for SEO Poisoning!
Practically anywhere you go, you’ll come across free WiFi hotspots. However, this free service could spell trouble. We explore the security risks of public hotspots and what to consider before connecting to public WiFi.
Continue Reading… The Risks of Public Hotspots: How Free WiFi Can Harm You
It’s safe to say at one point or another, we’ve all used USB drives to transfer and retrieve files from one computer to the next. As convenient as USB drives are for this purpose, it’s also extremely easy for attackers to distribute malware in the same fashion.
Continue Reading… USB Drives: Are You Plugging Malware into Your PC?
In some ways, protecting your computer safe can be thought of the same way as protecting your home.
In both cases, you have to be concerned about people breaking in, and in both your computer and your home, you need to be sure to lock the doors and turn on the alarm. But what happens if there are doors or windows at your house that you did not realize were open? Suddenly, fortifying your home just became more complicated.
Continue Reading… Zero-days: Exploits that take advantage of the unknown
If you’re an employee or someone who is looking for an employer, you likely have a LinkedIn account. Your LinkedIn account not only connects you other employees and employers, but it also contains personal information about your education, work history, and other contact information like home address, phone number, etc…
Continue Reading… How to Turn on Two-step Verification for Your LinkedIn Account