• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Search

Search results

Take The World Backup Day Pledge!

Spring has finally sprung, and it’s that time of year where a lot of us clean, organize, and simplify our lives. What a lot of people don’t realize is the importance of applying those principles to our digital data as well. We collect, organize and store ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
31-Mar-2015 | 10:25AM
Kudos:
1

New Vulnerability in OpenSSL Could Allow Attackers to Intercept Secure Communications

A new weakness in OpenSSL could allow attackers to hijack secure communications by tricking a targeted computer into accepting invalid and untrusted SSL certificates as valid certificates. This could help facilitate man-in-the-middle (MITM) attacks, where ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
09-Jul-2015 | 4:36PM
Kudos:
2

Apple’s iOS 9 Shines The Spotlight On Security

It’s another year and another shiny new iOS for all to enjoy! Apple hits the mark on all the usual exciting, fun enhancements such as a more intelligent Siri, and those new Emojis we’ve all been waiting for. However, after a few privacy mishaps last year, ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
14-Sep-2015 | 4:25PM
Kudos:
0

Thanksgiving- Cybersecurity Technologies We're Thankful for and Why

Thanksgiving not only marks the start of the fantastic holiday season—it’s also a time to reflect on what you’re thankful for. One of the many things to be thankful for this holiday is cybersecurity, which has gotten more and more advanced as of late. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
24-Nov-2015 | 8:00AM
Kudos:
2

Safe Online Shopping For The Holiday Season

The holidays are just around the corner, and that means many of us will be making purchases online to avoid large crowds and busy mall traffic, especially during Black Friday and Cyber Monday. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
02-Nov-2015 | 9:44AM
Kudos:
1

Encryption: How To Utilize it Online and Why It’s Important

Encryption is the process of protecting personal data, often with a form of “secret code,” so that it cannot be read by anyone who doesn’t have the code key.  Today, huge amounts of personal information are managed online, via computer applications, and s ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
02-Nov-2015 | 9:42AM
Kudos:
1

Why Smartphones and Tablets Need Security Software

Português Español You install Internet security software on your computer, but what about your smartphone or tablet? If you think the mobile devices don’t require security software, well, you’d be wrong. Treating your smartphone or tablet in the same mann ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
05-Nov-2015 | 1:41PM
Comments:
1
Kudos:
2

Up To 5 Million VTech User Accounts of Parents and Children May Have Been Compromised in Data Breach

This week, VTech, a global company that manufactures Internet connected learning products for young children announced that they have been involved in a massive data breach. The company’s learning devices, such as a smartwatch and smartphone, allow kids t ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
01-Dec-2015 | 2:13PM
Kudos:
1

What Is Malvertising?

Malvertising is a shortened term for malicious advertising, and is defined as using online advertising to spread malware. Malvertising requires placing malware-laden advertisements on legitimate web pages and through authentic online advertising networks ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
18-Nov-2015 | 2:27PM
Kudos:
1

PC or Mac: Which Is More Resistant to Cyber Threats?

Português Español Cyber criminals are not run-of-the-mill street hooligans. Assailants of online crimes are educated, tech-savvy, sophisticated individuals who don’t care if you prefer PC to Mac or vice versa. There has been considerable debate in the tec ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
26-Jan-2016 | 6:00PM
Kudos:
1

Your Identity Is Connected to All of Your Devices. Here's How to Protect It.

You don’t have to be a super geek to protect yourself from cyber criminals and hackers. Sure they might know more about computers and software than you do. However, there are basic defenses available to help you stand up against even the most sophisticate ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
25-Jan-2016 | 6:00PM
Kudos:
2

Credit Monitoring Services and Other Anti-Fraud Protection

Identity theft is the most common complaint lodged with the Federal Trade Commission, to the tune of 11.7 million a year. That means roughly one-in-five Americans over the age of 16 have become victims of identity theft. 14 percent of those victims experi ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
21-Jan-2016 | 3:07PM
Comments:
1
Kudos:
1

iOS Device Users Should Update to 9.2.1 Now!

iOS device users- update your software now! Apple released an update to iOS 9 this week, which fixes a three-year old cookie theft bug. Cookies are small files that contain various types of data that remember a user, and are placed on your computer or mob ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
21-Jan-2016 | 6:30PM
Comments:
1
Kudos:
0

Cyber Security Top Tips for 2016

2015 was a banner year for cybercriminals. We reported on 53 events that made it into the headlines, however that was just what we reported. There were many more than that occurred. We took a look at what was trending to try to predict the next “big thing ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
20-Jan-2016 | 3:57PM
Comments:
6
Kudos:
2

Thousands of Websites Have Been Compromised With Malicious Code

Symantec has recently identified thousands of websites that have been compromised with malicious code, which is used to redirect users to a compromised website. Of the compromised websites, 75 percent were located in the U.S. An injection attack relies on ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
22-Jan-2016 | 3:49PM
Comments:
2
Kudos:
0

6 Tips To Maintain Your Privacy While Searching For Jobs Online

Looking for employment today is dramatically different from how it was just two decades ago. It’s rare to just walk into a business, fill out an application, and get hired within the same day; today’s job hunt often begins and ends online. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
19-Jan-2016 | 8:46AM
Kudos:
0

What Are Cookies?

Mention “cookies,” and most people expect a treat to appear. When talking about computers, however, cookies aren’t what’s on the dessert menu. In fact, they’re not even physical objects. Yet they do a great deal of the work that makes it possible for you ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
29-Feb-2016 | 9:30AM
Kudos:
0

What to Do When a Device Is Lost or Stolen

Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging as it may be, you must remain calm so you can take the necessary steps to retrieve the device, or at least keep your data protected. You ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
24-Feb-2016 | 6:46PM
Comments:
1
Kudos:
1

Protecting Android Devices and Why They’re so Vulnerable

The security argument between Apple’s iOS and Google’s Android system for smartphones is heating up yet again. In a recent study conducted by Daniel R. Thomas, Alastair R. Beresford, and Andrew Rice at the University of Cambridge, research concluded that ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
22-Feb-2016 | 3:00PM
Kudos:
1

Participating in Legitimate Surveys- What Personal Data is OK to Give Away

Companies of all sizes use online surveys to gather important market research, which they later utilize to direct product development and marketing initiatives. This critical step in the marketing process is appealing to some online users because they get ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
17-Feb-2016 | 11:25AM
Kudos:
0

How to Remove GPS and Other Metadata Locations From Photos

Once upon a time, a photograph provided only the information one could see in the physical print—no hidden data about locations, time and date, or the device that took the photo.  With the advent of easy digital photography, however, connecting extra info ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
16-Feb-2016 | 2:40PM
Comments:
1
Kudos:
1

Software Terms of Service and Privacy Policies Explained

Português Español If you’re like most people, you don’t read the Terms of Service when you get a new app or buy a new device. That’s a big mistake, because a lot of apps on the market that are less-than-ideal, known as “grayware,” count on you allowing th ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
10-Feb-2016 | 2:25PM
Kudos:
0

What Personal Information Should You Safeguard?

Português Español Some 10 million identity thefts happen in the United States every year. Taking extra steps to protect your personal information—and knowing what information you need to safeguard—is the best way to prevent identity theft from happening t ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
04-Feb-2016 | 12:40PM
Kudos:
1

Biometrics How Do They Work? Are They Safe?

Biometrics are part of the cutting edge of technology. Put simply, biometrics are any metrics related to human features. Fingerprinting is a very early and simple version of biometrics, like when you login to your phone using your fingerprint. As with any ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
04-Feb-2016 | 10:05AM
Kudos:
0

8 Cyber Security Tips for Business Travelers

Whether you’re a regular business traveler, or a high-tech adventurer seeker, traveling—particularly abroad—poses unique cyber security threats. Business travelers are especially vulnerable because they often carry sensitive data, both personal and busine ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
01-Feb-2016 | 10:00PM
Comments:
1
Kudos:
3

Internet Scams Based on Current Events Plague Users

It’s sad to say, but cybercriminals have learned how to use our emotions against us. When we read media reports about accidents or watch videos of natural disasters on the news, it’s normal to feel empathy for the victims of tragic current events, or even ...
Blog Post
Author:
J2K2 Employee
Posted:
19-Feb-2016 | 1:35PM
Kudos:
2

What Are Browser Hijackers?

A browser hijacker is defined as a “form of unwanted software that modifies a web browser’s settings without the user’s permission.” The result is the placement of unwanted advertising into the browser, and possibly the replacement of an existing home pag ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
10-Mar-2016 | 10:38AM
Kudos:
0

4 Steps to Make Your Smart Home More Security Smart

“IoT” is an acronym for the “Internet of Things.” And any device that can connect to the Internet and transmit or receive data can be considered a “smart” thing. That includes smart homes, also known as connected homes. Smart homes — in which IoT devices ...
Blog Post
Author:
J2K2 Employee
Posted:
16-Mar-2016 | 11:03AM
Kudos:
1

Cyber Safety for Women

An unfortunate number of women are becoming victims of cyber crimes. According to a recent study more women are known to use the Internet to enrich their relationships compared to men. Young women, those 18-24, experience certain severe types of harassmen ...
Blog Post
Author:
Posted:
08-Mar-2016 | 3:55PM
Kudos:
3

7 Ways to Ensure Your Data Is Safe During Vacation

It’s barely spring and already you’re thinking about vacation. Where will you go? What will you do? Who will you meet? Vacations are an exciting, happy time for people to get away and avoid the everyday worries of home. But the fun and leisure comes to a ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
08-Mar-2016 | 11:44AM
Kudos:
1