Online Safety
Anatomy of a Viral Hoax What is real and what is fake? It’s becoming increasingly difficult to separate fantasy from reality online. By now, you’ve probably already run into your fair share of viral hoaxes. Scams, conspiracy theories and fake news spread like wildfire in the modern digital landscape. Real people often fall victim to…
[Read More]Please be aware that the use of proxy servers without the express permission from the owner of the proxy server may be illegal in some states and/or countries. Use them at your own risk. Use your favorite search engine and search for ‘proxy server list’. You’ll find many sites with lists of proxy servers, their…
[Read More]Oh, the internet. The wonderful home of carpool karaoke videos and viral cat memes also has a dangerous dark side. No, I’m not talking about the YouTube comments section. I’m referencing the cold, dangerous world of internet scams. Much like the endless stream of grandmas on Facebook, scams are an inherent part of internet culture.…
[Read More]Imagine that you’re shopping at a computer store and you present a credit card for payment. The cashier looks at you and asks, “do you have a photo I.D.? “ Even though it might seem a bit inconvenient to dig into your wallet or purse again to get a driver’s license or school I.D., it’s…
[Read More]Need to know the latest on viruses, malware, privacy, data breaches, IoT, threat intelligence, etc in 280 characters or less? WhatIsMyIPAddress.com is here to help! Twittersphere is full of security experts, researchers, and hobbyists who are more than eager to share their thoughts, news, and researches on information security, industry best practices and latest threats.…
[Read More]Let’s face it — traveling isn’t what it used to be. It’s not just about packing a suitcase full of clothes and a new book or magazines. Today, most of us can’t leave our homes without a laptop, tablet, camera and a smartphone or two. That’s why these travel safety tips are so important, especially…
[Read More]There’s a new twist on an old adage “let the buyer beware” for the computer age. It’s now “let the Internet browser beware.” That’s because the most likely threat to our online activity doesn’t come from a hacker (some trying to break into a computer network); it comes from a scam artist trying to trick…
[Read More]Be the champion and wrangle a promotion out of it. Companies are in the business of making money through selling products and services. But the way companies operate today primarily revolves around having a strong online presence and having networks and servers to run day-to-day operations. Even some of the biggest companies with massive IT…
[Read More]