Skip to content

Online Safety

Anatomy of a Viral Hoax

How to Spot Viral Hoaxes

Anatomy of a Viral Hoax What is real and what is fake? It’s becoming increasingly difficult to separate fantasy from reality online. By now, you’ve probably already run into your fair share of viral hoaxes. Scams, conspiracy theories and fake news spread like wildfire in the modern digital landscape. Real people often fall victim to…

[Read More]

How do I use a Proxy Server?

Please be aware that the use of proxy servers without the express permission from the owner of the proxy server may be illegal in some states and/or countries. Use them at your own risk. Use your favorite search engine and search for ‘proxy server list’. You’ll find many sites with lists of proxy servers, their…

[Read More]
Unlikely Internet scammers, including endearing grandparents and adorable kids

Unlikely Internet Scammers

Oh, the internet. The wonderful home of carpool karaoke videos and viral cat memes also has a dangerous dark side. No, I’m not talking about the YouTube comments section. I’m referencing the cold, dangerous world of internet scams. Much like the endless stream of grandmas on Facebook, scams are an inherent part of internet culture.…

[Read More]
Online Thieves HATE When You Use Two-Factor Authentication

Two-Factor Authentication: A Simple Step for Extra Security

Imagine that you’re shopping at a computer store and you present a credit card for payment. The cashier looks at you and asks, “do you have a photo I.D.? “ Even though it might seem a bit inconvenient to dig into your wallet or purse again to get a driver’s license or school I.D., it’s…

[Read More]
Cybersecurity Experts to Follow on Twitter

Top Cybersecurity Experts to follow on Twitter

Need to know the latest on viruses, malware, privacy, data breaches, IoT, threat intelligence, etc in 280 characters or less? WhatIsMyIPAddress.com is here to help! Twittersphere is full of security experts, researchers, and hobbyists who are more than eager to share their thoughts, news, and researches on information security, industry best practices and latest threats.…

[Read More]
7 Travel Safety Tips for Protecting Your Data and Identity on the Road

Travel Safety Tips for Protecting Your Phone, Laptops, and Identity

Let’s face it — traveling isn’t what it used to be. It’s not just about packing a suitcase full of clothes and a new book or magazines. Today, most of us can’t leave our homes without a laptop, tablet, camera and a smartphone or two. That’s why these travel safety tips are so important, especially…

[Read More]
Common Internet Scams

Scam Ahead! Proceed with Caution.

There’s a new twist on an old adage “let the buyer beware” for the computer age. It’s now “let the Internet browser beware.” That’s because the most likely threat to our online activity doesn’t come from a hacker (some trying to break into a computer network); it comes from a scam artist trying to trick…

[Read More]
These 4 Things Make Your Network Security 4X Stronger

4 Things To Make Your Network Security Stronger

Be the champion and wrangle a promotion out of it. Companies are in the business of making money through selling products and services. But the way companies operate today primarily revolves around having a strong online presence and having networks and servers to run day-to-day operations. Even some of the biggest companies with massive IT…

[Read More]