Since the early 2000s, online fraud has been a constant problem, always ready to trap unwary users. Antivirus software can protect you from most spammer tricks, but sometimes, even the strictest email spam filters may let a potentially dangerous email slip into your inbox. However, if you know the most common spammer tricks, protecting yourself … Read moreOnline Fraud: Most Common Spammer Tricks
With the potential to affect almost every computer with a microprocessor inside it, the Meltdown security vulnerability is creating some serious seismic activity in the computer industry. Perfectly named, Meltdown promises to send operating systems (including Windows, Android, macOS, iOS and Linux) into a catastrophic state of not only vulnerability, but also reduced performance. It’s … Read moreMeltdown: A Security Flaw like No Other
The WannaCry ransomware attack is a massive cybersecurity attack that struck organizations around the world in 99 different countries on Friday, May 12, including the United States, the United Kingdom, China, Russia, and more. It exploits a vulnerability (known as “Eternal Blue”) in Microsoft Windows that was reportedly identified by the US National Security … Read moreThe WannaCry Ransomware Attack
The Internet is an amazing place, but just like with any public space, people must use caution when they’re visiting in order to stay safe. Cyber criminals lurk around every corner, just waiting to find an opening to steal information, vandalize a computer, or send unwanted advertising. However, by following these Top 10 security … Read moreTop 10 Security Tips
The Internet is a tool that most people use on a regular, if not daily, basis. It has made working, playing and communicating much more convenient and efficient. It has also made it much easier for bad guys to target and strike individuals. Seeking personal data that can lead to identity theft, these criminals … Read moreInternet Security Essentials
Why spend the time, resources and even money it might cost to hack a computer to steal data and personal information when it’s just easier to get a victim to hand over the desired information willingly? That, according to Microsoft, is the crux of social engineering. This insidious form of cyber theft involves playing … Read moreWhat is Social Engineering?