Thanksgiving not only marks the start of the fantastic holiday season—it’s also a time to reflect on what you’re thankful for. One of the many things to be thankful for this holiday is cybersecurity, which has gotten more and more advanced as of late.
Mention “cookies,” and most people expect a treat to appear. When talking about computers, however, cookies aren’t what’s on the dessert menu. In fact, they’re not even physical objects. Yet they do a great deal of the work that makes it possible for you to browse the Internet—and they can cause trouble if you don’t know how to manage them.
Meet the Cookie
A computer “cookie” is more formally known as an HTTP cookie, a web cookie, an Internet cookie, or a browser cookie. The name is a shorter version of “magic cookie,” which is a term for a packet of data that a computer receives, then s...
Cyber criminals are not run-of-the-mill street hooligans. Assailants of online crimes are educated, tech-savvy, sophisticated individuals who don’t care if you prefer PC to Mac or vice versa. There has been considerable debate in the tech arena regarding the security of one machine over the other. Are PCs more prone to cyber attacks? Is a Macbook really less vulnerable to online threats? The debate wages on.
For a long time Mac users enjoyed a period of peace—they felt impervious to threats, only to realize years later that the sophisticated hacker would eventually evolve to this platform...
There are few times your smartphone or tablet will be more at risk than when you go on vacation. Although these items have been specifically designed to accompany you on your travels, they’re full of personal information that can put you, your finances, and your personal property at risk.
There’s no reason to assume the worst when you go on vacation, but you can greatly reduce your chances of a security breach by preparing your smartphone or tablet ahead of time and remaining vigilant while on your trip. Here’s how to prepare a smartphone or tablet before you go on vacation.
It’s barely spring and already you’re thinking about vacation. Where will you go? What will you do? Who will you meet? Vacations are an exciting, happy time for people to get away and avoid the everyday worries of home. But the fun and leisure comes to a screeching halt in the event that your personally data is compromised while traveling.
Vacations can often put your personal information at risk, due to careless missteps in how you go about preparing to leave, how you communicate while on vacation, and what you share on social media.
Here are seven ways to ensure your data stays safe wh...
A browser hijacker is defined as a “form of unwanted software that modifies a web browser’s settings without the user’s permission.” The result is the placement of unwanted advertising into the browser, and possibly the replacement of an existing home page or search page with the hijacker page. The idea is to make users visit certain websites whether they want to or not so the hijacker enjoys higher advertising revenue. Browser hijackers may also contain spyware to obtain banking information and other sensitive data.
As frustrating as browser hijackers can be, they luckily aren’t terribly...
Malware has become a catchall term for various types of cyber security risks, such as viruses, Trojan horses, worms, adware, ransomware and spyware. Many of us use these terms interchangeably to describe strange symptoms or behaviors encountered on a computer. However, all of them share a common goal, which is to compromise the safety of your devices. Symptoms of malware may appear obvious or discrete; knowing how to detect these dangerous intrusions will help you determine how to go about fixing the problem should it ever occur.
Malware is short for malicious software and refers to pro...
File sharing technology is an easy way for individuals or institutions to transfer content on the internet. There are several peer-to-peer (P2P) applications and services available. Some applications are free and others offer paid subscriptions for larger storage capacity, speedier service or extra security. File sharing is a very common activity for most online users, but file sharing also makes you susceptible to various online threats including identity theft, infection or attack.
If you plan on using file sharing technology be sure personal data and other sensitive materials are secur...
Did you know that an attacker can flood your house via the water dispenser on your connected refrigerator? Or that bluetooth enabled locks can be picked from ¼ of a mile away using radio frequencies? I didn’t either, until I attended this year’s DefCon 24, an annual hacking convention in Las Vegas.
While a hotel in Las Vegas full of 22,000 hackers sounds like it might not be a good idea, it’s just the opposite. The purpose of this conference is to bring together Internet security professionals from all over the world to help educate, inform and learn how to make the Internet a safer place...
If you’re like most people, you don’t read the Terms of Service when you get a new app or buy a new device. That’s a big mistake, because a lot of apps on the market that are less-than-ideal, known as “grayware,” count on you allowing them access to your information. They know most people don’t read the Terms of Service, so their Terms of Service include language authorizing a massive invasion of your privacy. At the same time, you might have noticed that most Terms of Service is just boilerplate. How do you read the Terms of Service and find out what you need to know about privacy without...
According to several studies on cost of ownership, users should replace their computer devices every four years. Not everyone will need to upgrade his or her computer every four years, but it’s a good rule to follow to ensure your data is safe and properly protected online.
To help you remember, every time we have a leap year ask yourself: when was the last time I bought a new computer? If you can’t remember, chances are you may be due for an upgrade. Once you’re ready to make the switch, you’ll need to follow a few steps to ensure your old technology has been properly wiped and recycled,...
Encryption is the process of protecting personal data, often with a form of “secret code,” so that it cannot be read by anyone who doesn’t have the code key. Today, huge amounts of personal information are managed online, via computer applications, and stored in the cloud, or servers with an ongoing connection to the Web.
You’re probably familiar with 3G, 4G, and Wi-Fi hotspots. In today’s increasingly connected mobile world, there are a variety of ways to get and stay connected to the Internet, but what’s really the safest way?
Truth be told, nothing is 100% safe. However, there are ways that you can beef up your own security to get as close to that 100% as possible. It begins with understanding what these technologies are, and the risks that come along with them.
How Do Mobile Devices Connect to the Internet?
Let’s break down the three different ways your mobile device can connect to the Internet, and...