Skip to content

Online Safety

Don

What to Consider Before Donating Your Computer

Let’s say you’re upgrading to a new computer and you want to donate your old one or even give it to someone else. Before you just hand it over, take a minute to think of the life’s worth of information stored on it. You’ve created files, written personal and business emails, stored pictures, and videos…and…

[Read More]
Vishing: Combining Phone and Online Fraud

Vishing: Phone Scam Prevention and Awareness

Vishing…it’s indeed an unusual sounding word, but there’s nothing funny about it. Vishing is a phone scam in which criminals call people with a scary sounding (but untrue) story about the compromised bank accounts and the money in it. But their goal isn’t to scare the individual…it’s to swindle them. It could happen to you,…

[Read More]
Anatomy of a Viral Hoax

How to Spot Viral Hoaxes

Anatomy of a Viral Hoax What is real and what is fake? It’s becoming increasingly difficult to separate fantasy from reality online. By now, you’ve probably already run into your fair share of viral hoaxes. Scams, conspiracy theories and fake news spread like wildfire in the modern digital landscape. Real people often fall victim to…

[Read More]

How do I use a Proxy Server?

Please be aware that the use of proxy servers without the express permission from the owner of the proxy server may be illegal in some states and/or countries. Use them at your own risk. Use your favorite search engine and search for ‘proxy server list’. You’ll find many sites with lists of proxy servers, their…

[Read More]
Unlikely Internet scammers, including endearing grandparents and adorable kids

Unlikely Internet Scammers

Oh, the internet. The wonderful home of carpool karaoke videos and viral cat memes also has a dangerous dark side. No, I’m not talking about the YouTube comments section. I’m referencing the cold, dangerous world of internet scams. Much like the endless stream of grandmas on Facebook, scams are an inherent part of internet culture.…

[Read More]
Online Thieves HATE When You Use Two-Factor Authentication

Two-Factor Authentication is a Simple Step for Extra Online Account Security

It’s a fancy-sounding term few of us know, but two-factor authentication is a security feature we should all know and use. There is an online security feature knows as 2FA (for two-factor authentication) that all banks, credit cards and stores offer to their customers. Some of us don’t know it; others know about it but…

[Read More]
Cybersecurity Experts to Follow on Twitter

Cybersecurity Experts to Follow on Twitter

Need to know the latest on viruses, malware, privacy, data breaches, IoT, threat intelligence, etc in 280 characters or less? WhatIsMyIPAddress.com is here to help! Twittersphere is full of security experts, researchers, and hobbyists who are more than eager to share their thoughts, news, and researches on information security, industry best practices and latest threats.…

[Read More]
7 Travel Safety Tips for Protecting Your Data and Identity on the Road

Travel Safety Tips for Protecting Your Phone, Laptops, and Identity

Let’s face it — traveling isn’t what it used to be. It’s not just about packing a suitcase full of clothes and a new book or magazines. Today, most of us can’t leave our homes without a laptop, tablet, camera and a smartphone or two. That’s why these travel safety tips are so important, especially…

[Read More]