Itās scary how many people share information on the Internet that should always be kept private.Ā Here are five things that you should never share online: 1.Ā Ā Ā Ā Ā Ā Confidential information about your identity –Ā This includes your address, phone number, social security number, and birth date. Donāt share this information about other family members either.Ā This…
Read MoreIf you use an AppleĀ® iPadĀ® or Amazon Kindleā¢, you may be wondering how safe the devices are.Ā When wireless devices are connected to the Internet, the possibility of security problems can arise. While there have been a few security issues related to the Kindle, there havenāt been any major problems because most people use…
Read MorePC World reports that company data belonging to customers of Microsoft’s hosted business suite BPOS has been accessed and downloaded by other users of the software. Oops. Breaches have happened to Google, Microsoft, and countless other SaaS providers. Here, it was a relatively small breach where a misconfiguration – presumably by a Microsoft employee –…
Read MoreMany viruses are spread through email, so it is smart to use a little caution when you get an attachment to an email.Ā Hereās how to avoid many problems associated with email attachments. Donāt open any attachment(s) from someone you donāt know.Ā If you receive an email from an unknown sender, delete it immediately or…
Read MoreFor the past few years, ISPs and network providers have been clashing with large online media companies like Google, Yahoo, and YouTube over the concept of Net Neutrality.Ā At issue is the question of whether an ISP should be able to block or slow access to some networks,Ā some content, or some applications, and whether…
Read MoreThe sheer volume of personal banking data and the ease with which it can be accessed is staggering. Donāt for a moment think that cost or lack of skill is a barrier to entry into the shady world of ācardingā and online financial fraud. Logon details for online banking are usually sold priced as a…
Read More2010 – Year of the Zombie Cloud? 2009 has been a notable year for malware and malicious online activity for a number of reasons and several of them relate to what is known as botnets. A zombie, or a bot, is a PC infected by malware that brings it under the remote control of a…
Read MorePhoto courtesy of Rahego from Creative Commons Bcc, or blind carbon copy, is a handy email tool that allows a sender to copy recipients without their names or addresses appearing on the email. The term āblind carbon copyā dates from the time when people used carbon paper in a typewriter to make additional copies. The…
Read MoreTodayās disclosure by Google and Microsoft that they were tricked into serving malware highlights an inherent conflict of interest between advertising-based businesses and the security needs of their customers.
Read MorePhoto Courtesy of nedykt in Creative Commons Malware (malicious software) is any software that ends up on your computer that is designed to do damage.Ā It may crash your system, destroy data, or reveal your confidential information to a hacker. How do you know if your computer has been infected with malware? Sometimes the signs…
Read More