• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Primary tabs

Search

Search results

Malware 101: How Do I Get Malware on My Computer? Part Two

In other posts, we’ve explained the different types of malware on the threat landscape, and some of the less complicated ways your computer can become infected with malware. In this article we’ll talk about the more complicated types of attacks that cyber ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
16-Mar-2015 | 2:18PM
Kudos:
3

Malware 101: What Is Malware?

Português Español Spyware, ransomware, and bots, oh my! A lot of these terms are prevalent on the Internet, but it may seem impossible to know what all these terms mean, and how they actually affect your devices and personal information. The term, “virus” ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
12-Mar-2015 | 2:29PM
Comments:
3
Kudos:
2

Malware 101: How Do I Get Malware on My Computer? Part One

We’ve previously explained the different types of malware that are prevalent on the threat landscape, which begs the question: How does malware get onto my computer? Bundled Free Software Programs Free is never usually 100% free when it comes to software ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
16-Mar-2015 | 2:05PM
Comments:
1
Kudos:
4

How to Spot Baseball Spring Training Scams

As winter drags on, almost everyone starts to look forward to spring — but perhaps no group looks forward to March quite as much as true-blue baseball fans. After all, its arrival means Cactus League and Grapefruit League spring training baseball camps op ...
Blog Post
Author:
J2K2 Employee
Posted:
14-Mar-2016 | 11:41AM
Kudos:
2

Why March Madness Is Bad for Business

Every spring the NCAA college basketball tournament — known as March Madness — turns workplaces into play spaces. Betting on brackets and watching games seem more suited to sports bars, but since many of the games are played during the workday, it’s not u ...
Blog Post
Author:
J2K2 Employee
Posted:
25-Mar-2016 | 5:44PM
Kudos:
4

How Can I Tell If I Have Malware and What Can I Do About It?

Português Español Malware has become a catchall term for various types of cyber security risks, such as viruses, Trojan horses, worms, adware, ransomware and spyware. Many of us use these terms interchangeably to describe strange symptoms or behaviors enc ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
14-Apr-2016 | 10:48PM
Kudos:
0

How Does Malware Get Past Security Software?

Have you ever run your Internet security software only to find out that there’s malware on your computer? How did it get there? When you’re running a full Internet security suite, it can be very frustrating to find out that, despite your best efforts, the ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
12-Apr-2016 | 10:46PM
Comments:
1
Kudos:
1

What Are Malicious Websites and Drive by Downloads?

Most people are unaware of the fact that you don’t have to intentionally download a malicious attachment in order to compromise your computer’s security. Malicious websites and drive-by downloads are just two ways that your security can become compromised ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
30-Nov-2015 | 1:30PM
Kudos:
2

What Is Malvertising?

Malvertising is a shortened term for malicious advertising, and is defined as using online advertising to spread malware. Malvertising requires placing malware-laden advertisements on legitimate web pages and through authentic online advertising networks ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
18-Nov-2015 | 2:27PM
Kudos:
1

DefCon 24- Hacking to Make the World a Better Place

a primer for you to become familiar with some of the more common threats out there: Malware 101: What ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
11-Aug-2016 | 3:27PM
Kudos:
1

Top 5 Tips to Protect Your Identity on Campus

Top 5 Tips To Protect Your Identity On Campus Back to school season is upon us, and while you are caught up in the enthusiasm of moving into your new dorms and ogling your class schedules, it is doubtful that the thought of protecting your identity is at ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
11-Aug-2014 | 11:13AM
Comments:
3
Kudos:
1

When Were Computer Viruses First Written, and What Were Their Original Purposes?

Modern day computer virus origins may surprise you- their goals were not quite the same as they are today. Early on, viruses had varied utilities and were engineered mostly by people in computer science industries.  College students created viruses for re ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
05-Aug-2014 | 2:18PM
Kudos:
0

Social Media Scams Based on Current Events

We are sure you’ve seen them lurking in your news feeds- breaking news reporting a celebrity’s death, photos of natural disasters striking major cities, video footage of riots and outrage over an accidental shooting- all seemingly legitimate news stories. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
28-Aug-2014 | 9:46AM
Kudos:
1

How to Spot a Fake Android App

简体中文 日本語 Just because an app is in the Google Play Store doesn’t mean that it is a legitimate app. Google is constantly removing fraudulent apps from the Android marketplace, such as fake antivirus, browsers, and games.  Besides Google Play, and other app ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
18-Aug-2014 | 4:41PM
Kudos:
2

A Cold Calling Scammer- a Personal Experience

I was sitting in my home office when my home phone line rang. It was late. 10:30pm to be exact, but I often use this quiet time, after my kids have gone to bed, to catch up on email. ...
Blog Post
Author:
gerry_egan Employee
Posted:
09-Dec-2015 | 2:37PM
Comments:
3
Kudos:
3

Credit Monitoring Services and Other Anti-Fraud Protection

Identity theft is the most common complaint lodged with the Federal Trade Commission, to the tune of 11.7 million a year. That means roughly one-in-five Americans over the age of 16 have become victims of identity theft. 14 percent of those victims experi ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
21-Jan-2016 | 3:07PM
Comments:
1
Kudos:
1

Telltale Signs an App Is Violating Your Privacy

Malware isn’t just for laptops and desktops. In fact, it can be a lot easier for malware to end up on your mobile phone or tablet than your computer. When it comes to mobile malware, a little bit of paranoia goes a long way. Malicious apps can steal your ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
20-Jan-2016 | 2:05PM
Kudos:
0

PC or Mac: Which Is More Resistant to Cyber Threats?

Português Español Cyber criminals are not run-of-the-mill street hooligans. Assailants of online crimes are educated, tech-savvy, sophisticated individuals who don’t care if you prefer PC to Mac or vice versa. There has been considerable debate in the tec ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
26-Jan-2016 | 6:00PM
Kudos:
1

What Is a DDoS Attack?- #30SecTech by Norton

A distributed denial-of-service (DDos) attack is one of the most powerful weapons on the Internet. Most times that you hear about a website being “brought down by hackers” what that means is that it’s become a victim of a DDoS. A distributed denial-of-ser ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
29-Jan-2016 | 12:02PM
Kudos:
2

Biometrics How Do They Work? Are They Safe?

Biometrics are part of the cutting edge of technology. Put simply, biometrics are any metrics related to human features. Fingerprinting is a very early and simple version of biometrics, like when you login to your phone using your fingerprint. As with any ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
04-Feb-2016 | 10:05AM
Kudos:
0

6 Tips To Maintain Your Privacy While Searching For Jobs Online

Looking for employment today is dramatically different from how it was just two decades ago. It’s rare to just walk into a business, fill out an application, and get hired within the same day; today’s job hunt often begins and ends online. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
19-Jan-2016 | 8:46AM
Kudos:
0

What Are Cookies?

Mention “cookies,” and most people expect a treat to appear. When talking about computers, however, cookies aren’t what’s on the dessert menu. In fact, they’re not even physical objects. Yet they do a great deal of the work that makes it possible for you ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
29-Feb-2016 | 9:30AM
Kudos:
0

Good Cyber Hygiene

Have you heard of something called cyber hygiene? Surely brushing teeth and taking showers isn’t something we traditionally associate with technology—yet the term is a useful metaphor for those of us who need to make smart decisions about our smart device ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
26-Feb-2016 | 6:46PM
Comments:
1
Kudos:
2

What to Do When a Device Is Lost or Stolen

Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging as it may be, you must remain calm so you can take the necessary steps to retrieve the device, or at least keep your data protected. You ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
24-Feb-2016 | 6:46PM
Comments:
1
Kudos:
1

Protecting Android Devices and Why They’re so Vulnerable

The security argument between Apple’s iOS and Google’s Android system for smartphones is heating up yet again. In a recent study conducted by Daniel R. Thomas, Alastair R. Beresford, and Andrew Rice at the University of Cambridge, research concluded that ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
22-Feb-2016 | 3:00PM
Kudos:
1

What To Do When You Fall For An Email Scam

Falling for an email scam is something that can happen to anyone. It’s a frightening concept, and one that frequently results in undiluted panic. Also known as a phishing scam, an email scam involves using email and fraudulent websites to steal sensitive ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
19-Feb-2016 | 10:00AM
Kudos:
0

Participating in Legitimate Surveys- What Personal Data is OK to Give Away

Companies of all sizes use online surveys to gather important market research, which they later utilize to direct product development and marketing initiatives. This critical step in the marketing process is appealing to some online users because they get ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
17-Feb-2016 | 11:25AM
Kudos:
0

How to Remove GPS and Other Metadata Locations From Photos

Once upon a time, a photograph provided only the information one could see in the physical print—no hidden data about locations, time and date, or the device that took the photo.  With the advent of easy digital photography, however, connecting extra info ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
16-Feb-2016 | 2:40PM
Comments:
1
Kudos:
1

Software Terms of Service and Privacy Policies Explained

Português Español If you’re like most people, you don’t read the Terms of Service when you get a new app or buy a new device. That’s a big mistake, because a lot of apps on the market that are less-than-ideal, known as “grayware,” count on you allowing th ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
10-Feb-2016 | 2:25PM
Kudos:
0

National Clean Out Your Computer day-The Importance of Clean Computing

February 8th is National Clean out Your Computer day, and as they say, “Cleanliness is next to Godliness.”  For centuries, this saying applied to tasks like scrubbing the floors and dusting the bookcases. Today, however, it applies to your computer just a ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
08-Feb-2016 | 4:00PM
Kudos:
1