Skip to content

Online Safety

Top 5 Mobile Security Threats and How to Avoid Them

The Most Common Mobile Security Threats and How to Avoid Them

How many times a day do you think you check your phone? Is it 20, 50, 70? Whatever is the number you estimate, double it and then you might be somewhere close. According to psychologists, people use their smartphones twice as much as they think they do. This is no surprise, given that the convenience…

[Read More]
Top 5 Mobile VPNs

Top 5 Mobile VPNs

The advances in technology over the decades are phenomenal. Consider this: The mobile phone/smartphone in your pocket has more computing power than NASA used to go to the moon in the 1960s—the Apollo Guidance Computer (AGC) had approximately 64Kb of memory and operated at 0.043Mhz. Arguably, you’re also probably more attached to it than some…

[Read More]
Man-in-the-Middle Attacks explained, defined

Man-in-the-Middle Attack: When Hackers Eavesdrop on Your Connection.

Not all hackers are after attention. Some just want money. You might think, and hope, that being aware of all the latest scams and tricks that are on the Internet will keep the online thieves away. After all, if you’re smart AND you know what to look for, you won’t fall for somewhat obvious scams…

[Read More]

MaaS Chaos. Malware-as-a-Service is Growing.

Everyone who has watched mobster or drug-trade movies has heard the term, “organized crime” or “black market” and understands what it means. Instead of a corner drug dealer or small-time thief working alone, a network of criminals come together (under the radar) to break the law and make money on a large scale. In the…

[Read More]
IRS Scams: Know How to Avoid Fraud!

IRS Scams: Know How to Avoid Fraud!

Every time tax season rolls around, so does tax-scam season. Starting in January, scam artists (especially online con artists) pose as the Internal Revenue Service (IRS). Their goal? To fool and defraud taxpayers—in other words, to scare you into giving them your money, your bank account information and your Social Security number. They do it…

[Read More]
Government Snooping and Censorship Are All Over the Internet

Internet Enemies: Recognize & Protect Yourself

Your access to the Internet is determined by many factors. Your school or your local library can put limits on websites you can see. However, beyond that, most of us are used to accessing pretty much what we want on the Internet. Some households even put Internet filters on their networks, voluntarily, to prevent access…

[Read More]

Hackers Learned ‘Do It Yourself’ How did hackers attack Home Depot?

If there’s an open window, a crook will climb in. If there’s a crack in a network’s operations, a hacker will slip through it and find a way to do damage. Individuals and businesses need to learn that hackers are always on the prowl, but large organizations are at greater risk because they have more…

[Read More]

What is the Heartbleed Bug?

We have two articles on our website about changing your passwords (Change Your Password? and Better Passwords) and why it’s a good idea. Now would be a good time to read it. In April 2014, some security experts discovered something that sent chills down their spines. The software code that’s used to encrypt a majority…

[Read More]