With Mother’s Day just around the corner, cybercriminals are working up ways to take advantage of this time when you’re online looking to buy flowers, candies, perfumes, jewelry or whatever gifts for mom might be hot this year. Phishers follow a similar editorial calendar as newspaper and magazine editors, coordinating their attacks around holidays and Read more…
Yes, such a day exists and it’s today, May 7th 2013. Intel and McAfee are working to make sure consumers increase their security awareness and front line of digital protection by asking everyone to change their passwords today. Reuse of passwords across multiple sites is a big problem. In the digital world, many of us Read more…
You’ve done it. You’ve graduated at last. Your whole life is in front of you. Now is the time to make plans, embrace the world, take responsibility, make a statement, do some good and make this place better than how you found it. And this should go without saying, but please don’t be stupid. I’m Read more…
Here’s a late night infomercial for you: How’s that burger flipping going? That cubicle working out ok? Anyway, I’m sure your boss is such a nice guy. Guess what! If you’re interested in a career in criminal hacking, you don’t even need a computer! This special, one-time offer comes to you right now from the Read more…
Bugs. Creepy, crawly, never-really-know-where-they’re-hiding, infestations of bugs. If we could just see them all, we would rid our lives of bug infestations with doses of (environmentally friendly) spray. But what about the bugs that we can’t see? What about the bugs that have snuck past, and infiltrated the hidden corners of our lives, then quietly Read more…
Imagine this: You’re walking past your favorite store and your phone buzzes to ask you if you like the new spring collection. Or maybe it wants to know what you think about the new running shoes displayed in the storefront just up ahead. Conversations with your phone aren’t just something to imagine anymore; recently companies Read more…
Mobile technology is the new frontier for fraudsters. Today, there are more wireless devices than American people.[1] Mobile devices connect to the Internet and have much of the same information and capability as a personal computer. Your device and the private data it holds are very, very attractive to thieves. Yet, most of us don’t Read more…
We’ve always been told to “read the fine print before you sign on the dotted line,” but let’s be frank. In today’s digital world, all we want to do is play that new game, test that new app and hear that new song. The fine print seems like an unnecessary barrier to our fun. Most Read more…
Have you been bullied lately? Probably not, but to get you in the right mindset, think about your commute this morning, and that car that cut you off… Feel it now? That’s what it feels like for your kids when they get bullied, online, anonymously. Imagine that driver posts online about cutting you off, mocking Read more…
Did you know that while you innocently play games or browse Facebook on your smartphone or tablet, someone might be tracking your every move? Through a stream of data “leaked” by your mobile gadgets, cybercriminals can determine which direction you’re headed, how fast you’re walking and how long your strides are. Leaked data can even Read more…