It is truly said that the world is growing smaller. And emails are one way which has helped us to communicate with our loved ones. They allow us to stay in touch with people all across the world and forwards are a wonderful way of indicating, ‘I remember you’. We forward jokes, amazing pics, philosophical ...
Read Blog
Have you ever bitten into an apple and found a worm? I have, and it’s yummy! Anyway, how many times have you heard, or even said, “I won’t get that computer virus because I have a Mac”?  While Mac users tend to feel somewhat insulated from viruses, it’s time for anyone who owns an Apple ...
Read Blog
1. Realize that you can become a victim at any time. Not a day goes by when we don’t hear about a new hack. With 55,000 new pieces of malware a day, security never sleeps. 2. Think before you post. Status updates, photos, and comments can reveal more about you than you intended to disclose. ...
Read Blog
One in five online consumers has been a victim of cybercrime in the past two years. Social networking is a direct link to the problem. While social networks allow you to keep in touch with family and friends, there are issues to be concerned about. Most concerns revolve around online reputation management, identity theft, or ...
Read Blog
Protect your information by creating a secure password that makes sense to you, but not to others. Most people don’t realize there are a number of common techniques used to crack passwords and plenty more ways we make our accounts vulnerable due to simple and widely used passwords. How to get hacked Dictionary attacks: Avoid ...
Read Blog
I finally got one of those “I’m stuck in London” emails. My friend Kate’s Gmail account was hacked, and everyone on her contact list received an email from a hacker posing as Kate: “Hi, Apologies, but I made a quick trip, to London,United Kingdom and got mugged, my bag, stolen from me with my passport ...
Read Blog
I often hear Mac users say “Oh, I don’t have to worry about viruses. I have a Mac!” Well, unfortunately, those days have come to an end. The market share of Apple owners has tipped enough that criminal hackers are taking notice and creating malware targeting Mac users. McAfee explains that there have been Fake ...
Read Blog
McAfee’s most unwanted criminals have included pickpockets, Trojan viruses, and ATM skimmers, dumpster divers, spies, and wireless hackers and now phishers, shoulder surfers, and keyloggers. Identity theft can happen online or on the ground to anyone with a pulse, and even to the deceased. The key is awareness, vigilance, and investing in products and services ...
Read Blog
Most of us have become accustomed to giving out the last four digits of our Social Security numbers. But this customary request is becoming increasingly problematic, and two Rhode Island lawmakers are responding by pushing legislation to stop businesses from asking for the last four digits of customers' Social Security numbers. Researchers at Carnegie Mellon ...
Read Blog