• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Primary tabs

Search

Search results

Malware 101: How Do I Get Malware on My Computer? Part Two

In other posts, we’ve explained the different types of malware on the threat landscape, and some of the less complicated ways your computer can become infected with malware. In this article we’ll talk about the more complicated types of attacks that cyber ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
16-Mar-2015 | 2:18PM
Kudos:
3

Malware 101: What Is Malware?

Português Español Spyware, ransomware, and bots, oh my! A lot of these terms are prevalent on the Internet, but it may seem impossible to know what all these terms mean, and how they actually affect your devices and personal information. The term, “virus” ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
12-Mar-2015 | 2:29PM
Comments:
3
Kudos:
2

Malware 101: How Do I Get Malware on My Computer? Part One

We’ve previously explained the different types of malware that are prevalent on the threat landscape, which begs the question: How does malware get onto my computer? Bundled Free Software Programs Free is never usually 100% free when it comes to software ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
16-Mar-2015 | 2:05PM
Comments:
1
Kudos:
4

What Are Malicious Websites and Drive by Downloads?

Most people are unaware of the fact that you don’t have to intentionally download a malicious attachment in order to compromise your computer’s security. Malicious websites and drive-by downloads are just two ways that your security can become compromised ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
30-Nov-2015 | 1:30PM
Kudos:
2

What Is Malvertising?

Malvertising is a shortened term for malicious advertising, and is defined as using online advertising to spread malware. Malvertising requires placing malware-laden advertisements on legitimate web pages and through authentic online advertising networks ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
18-Nov-2015 | 2:27PM
Kudos:
1

How to Spot Baseball Spring Training Scams

As winter drags on, almost everyone starts to look forward to spring — but perhaps no group looks forward to March quite as much as true-blue baseball fans. After all, its arrival means Cactus League and Grapefruit League spring training baseball camps op ...
Blog Post
Author:
J2K2 Employee
Posted:
14-Mar-2016 | 11:41AM
Kudos:
2

How Can I Tell If I Have Malware and What Can I Do About It?

Português Español Malware has become a catchall term for various types of cyber security risks, such as viruses, Trojan horses, worms, adware, ransomware and spyware. Many of us use these terms interchangeably to describe strange symptoms or behaviors enc ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
14-Apr-2016 | 10:48PM
Kudos:
0

How Does Malware Get Past Security Software?

Have you ever run your Internet security software only to find out that there’s malware on your computer? How did it get there? When you’re running a full Internet security suite, it can be very frustrating to find out that, despite your best efforts, the ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
12-Apr-2016 | 10:46PM
Comments:
1
Kudos:
1

Why March Madness Is Bad for Business

Every spring the NCAA college basketball tournament — known as March Madness — turns workplaces into play spaces. Betting on brackets and watching games seem more suited to sports bars, but since many of the games are played during the workday, it’s not u ...
Blog Post
Author:
J2K2 Employee
Posted:
25-Mar-2016 | 5:44PM
Kudos:
4

DefCon 24- Hacking to Make the World a Better Place

a primer for you to become familiar with some of the more common threats out there: Malware 101: What ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
11-Aug-2016 | 3:27PM
Kudos:
1

Top 5 Tips to Protect Your Identity on Campus

Top 5 Tips To Protect Your Identity On Campus Back to school season is upon us, and while you are caught up in the enthusiasm of moving into your new dorms and ogling your class schedules, it is doubtful that the thought of protecting your identity is at ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
11-Aug-2014 | 11:13AM
Comments:
3
Kudos:
1

When Were Computer Viruses First Written, and What Were Their Original Purposes?

Modern day computer virus origins may surprise you- their goals were not quite the same as they are today. Early on, viruses had varied utilities and were engineered mostly by people in computer science industries.  College students created viruses for re ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
05-Aug-2014 | 2:18PM
Kudos:
0

Social Media Scams Based on Current Events

We are sure you’ve seen them lurking in your news feeds- breaking news reporting a celebrity’s death, photos of natural disasters striking major cities, video footage of riots and outrage over an accidental shooting- all seemingly legitimate news stories. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
28-Aug-2014 | 9:46AM
Kudos:
1

How To Protect Yourself From Cyberstalkers

With the wealth of information available online, this makes it easier for Cyberstalkers to gain access to their victims. Read on to learn about ways to keep your personal information hidden from unwanted eyes. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
30-Sep-2014 | 10:38AM
Kudos:
1

How To Avoid Identity Theft Online

Identity theft is a growing threat on the Internet landscape. 9 million identities are stolen in the US every year. Learn how to protect yourself from becoming one of those 9 million. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
30-Sep-2014 | 10:24AM
Kudos:
1

How To Protect Yourself From Phishing Scams

Phishing scams have one objective- gaining access to your money. Cybercriminials are always trying different tactics to try to trick you out of your personal information. Read on to learn how to spot a scam and protect yourself against scams and spyware. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
30-Sep-2014 | 10:16AM
Kudos:
1

How To Choose a Secure Password

Strong, secure passwords are one thing that stands between you and a potential data breach. Here are some tips on how to make your passwords more secure and ways to manage them all. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
30-Sep-2014 | 9:57AM
Kudos:
2

Keeping Your Mobile Fitness Data Secure

日本語 October is National Cyber Security Awareness month. Mobile fitness trackers are a new technology that is all the rage. Learn how to secure your health data and continue to use these useful tools in becoming a healthier you. This is part 10 in a series ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
08-Oct-2014 | 1:59PM
Kudos:
0

Mobile Scams: How-to Identify Them and Protect Yourself

With the mobile market gaining on PCs, cybercriminals are setting their sights on mobile devices. Learn how to protect yourself from mobile malware, phishing attempts, social media scams and more. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
03-Oct-2014 | 12:38PM
Kudos:
1

Security Concerns and the Connected Car

Connected cars are a relatively new technology in the Internet of Things, however, we've dug a little deeper into this tech. Read on to learn just how secure these technologies are and what you can do to safeguard your personal information. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
15-Oct-2014 | 2:07PM
Kudos:
1

My Account May Have Been Hacked—What To Do Now?

简体中文 日本語 You may have seen it on the news recently; 7 million Dropbox usernames and passwords were allegedly stolen. Initial reports were that the Dropbox service itself had been hacked; however, the company issued the following statement on their blog: T ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
14-Oct-2014 | 7:48PM
Kudos:
2

The Connected Home- Just How Safe Is Convenience?

The connected home, or smart home, is the next big thing within the Internet of Things (IoT). Here we examine the security concerns of this new emerging technology, and give you tips on how to keep your automated home safe. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
17-Oct-2014 | 3:58PM
Comments:
1
Kudos:
1

Parents Best Practices to Social Media Security

With connected kids today, it can be a full-time job for parents to be able to monitor their online activities. We’ve put together some helpful tips and guidelines so that you and your whole family can enjoy social media safely. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
17-Jan-2016 | 9:43AM
Kudos:
0

How Do Cybercriminals Get Caught?

It's a rather long and complicated process with many individuals involved. Here we explain just how cybercriminals get caught. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
24-Oct-2014 | 2:07PM
Kudos:
0

Theft-Proof Your Mobile Data

What would your company do if an employee's device was lost, or even worse, stolen? Does your business  have measures in place to protect the data on the device? ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
20-Oct-2014 | 10:59AM
Kudos:
0

Four Mobile Threats that May Surprise You

Viruses and malware isn't just for computers anymore. What is your business doing to keep your mobile devices safe from these threats? ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
20-Oct-2014 | 10:46AM
Kudos:
0

The Importance of General Software Updates and Patches

Software updates can seem like an annoyance, but they are actually critical to the protection of your system. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
03-Nov-2014 | 4:27PM
Comments:
12
Kudos:
5

POS Malware Data Breaches and Why They Keep Happening

In recent news, more and more reports have surfaced about data breaches impacting millions of consumers. Many of these data breaches involve a business’s point of sale. The main objective of point of sale (POS) breaches is to steal your 16-digit credit ca ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
11-Nov-2014 | 2:09PM
Kudos:
0

The Importance of Two-Factor Authentication

With reports of data breaches becoming more frequent, now is the time to look into ways to make your accounts more secure. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
15-Dec-2014 | 10:44AM
Comments:
2
Kudos:
4

Securing Your Game Console and Gaming Account

简体中文 日本語 Today’s gaming consoles are independent computers, but they are not yet at the stage where they are susceptible to malware in the same way PCs and other devices are. Even though the consoles are resistant to malware for the time being, there are ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
06-Jan-2015 | 2:26PM
Comments:
1
Kudos:
2