Hacker’s Using New Techniques
As cyber criminals put more effort into sophisticated attacks against specific firms, they are not just using email to get to company’s users. They are...
Virus 101
Most infections take place on Windows machines, and even though many people think that Macs are immune to infections, they are not! Yes, Macs...
“Star Trek Continues”
What a year to be a Star Trek fan. Last week “Star Trek Into Darkness” premiered to amazing reviews and box office records. Also...
Cyber Criminals Looks Towards Mobile
Symantec’s 18th annual Internet Security Threat Report is was issued yesterday. The report reveals that cyber criminals are increasingly scouring the Web for personal...
Contacting Loved Ones in Times of Tragedy
Monday’s tragedy got me thinking about different ways to contact our loved ones and friends during times like the one our country just went...
Boston Malware Alert
In an unbelievable turn of events and another example of just how far some cyber criminals will go to inflict misery on our computers...
Fine Tuning Your Facebook Profile
The popularity of Facebook cannot be questioned. Since its launch in 2004 it has grown to over 1 billion users (as of October 2012). Almost 50%...
How To Know If Malware Has Invaded Your PC
How do you know if you computer has been compromised by Malware? I am often asked the question. Malware can make your computer do...
Cyber Attack in South Korea
Cyber Security has been in the news recently and it seems the threat of cyber crime is increasing every day. As Cyber Security concerns...
The President’s Cybersecurity EO
President Obama’s just-released cyber security executive order has sparked concern from several advocacy groups debating issues surrounding “too much regulation”, “not enough protection” and...