It's something that happens to everyone: you're checking your e-mail and a message catches your eye. It says it's urgent and it seems to come from a company or person you think you know, so you open the message. It tells you there's a problem with your account and to use a link provided in the message to fix the problem. If you click it, it goes to a page that looks right, but how can you really be sure? How do you tell which e-mails are safe and legitimate from the ones that are looking to steal your information or, worse, money?
This Common IT Policy Makes Your Organization Less Secure
Some time-tested IT policies are as true today as they were two decades ago, but this IT policy needs to stay in yesteryear.
How Your Social Media Accounts Make Identity Theft Easier (Part 2)
We often think of cyber-crime as the domain of elite hackers, but you may be surprised to learn that hackers often need not look past public data on social media accounts to compromise an identity.
Did A Facebook Bug Share Your Photos Without Your Consent?
Facebook has acknowledged a bug affecting 6.8 million users that gave Apps and their developers unauthorized access to Facebook user photos and uploads. Was yours one of them?
How Your Social Media Accounts Make Identity Theft Easier (Part 1)
Social media can be a powerful tool for staying in touch with friends and family or keeping up with current events, but how can the information we post on social media be used to help fraudsters steal our identity?
Is Antivirus Software Enough to Protect Me From Computer Viruses and Malware?
You know computer viruses are bad. This is why you installed antivirus software, but are you still at risk even with a great antivirus product installed? Let's take a look together.
Do I Really Need a Lock Screen on My Phone?
If you look at your smartphone and wonder, "why do I need to have a PIN code or registered fingerprint to unlock this phone? Why do I need to unlock it at all?" Here's why.
4 Tips for Securing Your Social Media Accounts
When you think about identity theft, a few things probably come to mind immediately: social security numbers, credit reports, and your financial accounts. Often overlooked, though, are social media accounts, which are an increasingly popular target for online hackers and fraudsters.
Does an Internet Security Blog Need to be Technical?
Surviving the Internet era can be difficult: we all know the web can be a modern Wild West, so how do we navigate it safely? How do we help our children, parents, or grandparents reduce the risk of living in an Internet connected world without tightening security settings to the point their devices become unusable?