General Topics
Finally, FBI, Others Stop the Avalanche Network If you follow stories about online thieves and cyberterrorism, the news is almost always about hackers getting away with a huge, damaging attack. But in early December of 2016, the FBI and the United States Department of Justice released good news to the citizens of the U.S. and…
[Read More]One of the benefits of a virtual private network (VPN), experts will tell you, is that any messages or data transmitted through a VPN are encrypted, which makes it all secure and unreadable. On a larger scale, all bank and credit card websites use encryption for transmitting their customers’ data. But just what does encryption…
[Read More]2018 Gave Us Plenty of Hacker News and More Concerns About the Security of Our Personal and Financial Data A major breach of consumer data (your information!) and other troublesome and massive hack attacks are nothing new—and it’s sad we’re getting used to data breach stories. But 2018 saw a surge in reported breach incidents…
[Read More]If you’ve looked at an iPod, iPhone, or other smartphones, if you’ve used the Firefox, Chrome, or Opera browsers, or if you’ve used Google in the past couple of years, you’ve probably seen something that points out your location. Indeed, Google has long been able to target local results to your searches based on where…
[Read More]Computers around the world are infected. What happened? On Friday, May 12, 2017, a massive cyber attack called WannaCry took place globally, affecting millions of computers, thousands of companies and agencies, and catching most of the world totally off guard. This brand of hack falls under the category of ransomware, which you can learn more…
[Read More]Many people know how to drive a car, but have little or no knowledge about how the car actually works. So, too, are many people familiar with how to view and navigate web pages, but have limited knowledge of how those web pages do what they do. Here we will answer the question: “What is…
[Read More]Almost all of your online activity is made possible through the help of protocols—the special networking-software rules and guidelines that allow your computer to link up to networks everywhere so you can shop, read news, send email and more. (Your IP address, which stands for Internet Protocol, is just one of many.) The protocols are…
[Read More]Do you still get emails from people, companies and websites that you have no interest in and that you never asked for? If yes, then you’re still being hounded by one of the Internet’s oldest problems: spam. You’d think that by now spam would have been outlawed or something. And you’re right: Because it is…
[Read More]