Recent Articles

Five Ways to Protect Your Child Online

Five Ways to Protect Your Child Online

| January 6, 2017 | 0 Comments

As parents, our job is to protect our children in every way possible. Here are five ways that you can protect your child online so that internet use can be a joy and not a burden to you and your family.

Continue Reading

Hackers Invited by the Government’s Top Military Office – The Pentagon

Hackers Invited by the Government’s Top Military Office – The Pentagon

| April 8, 2016 | 0 Comments

The Pentagon joins a growing number of organizations that are taking their security issue to the public for help.

Continue Reading

Computer Security Bug Threatens 1000s of Devices Across the Globe

Computer Security Bug Threatens 1000s of Devices Across the Globe

| February 27, 2016 | 0 Comments

The bug that is a possible threat to thousands’ of devices across the globe is named CVE-2015-7547.

Continue Reading

The Rising Demand for Cybersecurity Professionals Worldwide

The Rising Demand for Cybersecurity Professionals Worldwide

| February 19, 2016 | 0 Comments

The year 2016 has set out to be quite promising for the cyber-security market. According to recent reports, the burgeoning industry is going to see about 1-million job openings this year.

Continue Reading

Scam Watch: This Is Tech Support Calling

Scam Watch: This Is Tech Support Calling

| September 19, 2015 | 0 Comments

It’s been almost 2 years since I first heard about the Microsoft Tech Support call scams, but it looks like they are still alive and well and trying to get into our computers.

Continue Reading

Familiarizing Yourself with How to Use Firewalls

Familiarizing Yourself with How to Use Firewalls

| August 8, 2015 | 0 Comments

Your home computer security should include having firewall protection for your computer in order to protect both incoming and outgoing information.

Continue Reading

Sandboxing 101: Protect Yourself When Opening Suspicious Documents

Sandboxing 101: Protect Yourself When Opening Suspicious Documents

| July 10, 2015 | 0 Comments

A sandbox is a controlled environment where testing can be done and results can be scientifically studied. Here are two excellent and free ways to get started with sandboxing.

Continue Reading

Cyber Extortion: How Hackers Use Stolen Data to Blackmail You

Cyber Extortion: How Hackers Use Stolen Data to Blackmail You

| June 28, 2015 | 0 Comments

Cyber extortion, like blackmail, is often used to obtain money, property, or information from someone against their will. Here are a few tips that can help keep you from falling victim to a cyber extortionist.

Continue Reading

Malvertisements: How Viewing an Ad Can Infect Your Computer

Malvertisements: How Viewing an Ad Can Infect Your Computer

| June 15, 2015 | 0 Comments

A website visitor doesn’t even need to click on a malicious advertisement to have their computer infected, simply viewing the advertisement in their browser is often enough to cause a virus to infect the computer.

Continue Reading

Mobile Device Security- How to Protect Your Tablet and Smartphone

Mobile Device Security- How to Protect Your Tablet and Smartphone

| May 20, 2015 | 0 Comments

Smartphones and tablets suffer from a different set of security concerns than desktops and laptops. Here are a few security tips to keep in mind when securing them.

Continue Reading