Skip to content

The Learning Center

Raj Samani talks about the cost of cyber crime and why it worries him.

The Full Cost of Cyber Crime is Hard to Measure – Here’s Why

When it comes to the world of cybersecurity and cyber crime, it can be difficult to quantify anything. Protecting data and network infrastructure is a constant effort. When a cybersecurity expert is doing their job, nothing will happen, so it’s hard to recognize success. And since there is so little reporting done, it can be…

[Read More]
A person using a laptop displaying Antivirus Software

What is Antivirus Software?

The first computer virus, known as the Creeper Program, was created as a security measure to test self-replicating computer code. The aptly-named Creeper accidentally infiltrated computer hard drives in 1971, and then it tried to remove itself — its intent wasn’t malicious.  Sadly, since that time, intentional viruses have become increasingly sophisticated. They are a…

[Read More]

TruePeopleSearch Opt-Out Guide

How to easily remove your information and opt out of TruePeopleSearch TruePeopleSearch is a free people search website offering details such as names, addresses, phone numbers, and email addresses. If safeguarding your online privacy is a concern for you, removing your personal information from TruePeopleSearch might be a step you’d want to take. Here’s a…

[Read More]

The Ashley Madison Scandal Resurfaces

When Ashley Madison, the dating website for cheaters, launched in 2002, it was seen as a fringe space for clandestine affairs. However, by 2015, the site claimed 31.5 million members and boasted international, high-profile recognition.  Despite a questionable mission — to foster and facilitate infidelity — Ashley Madison was primed to “go public” and hoped…

[Read More]
A man looking frustrated over MAC address spoofing while using his computer

What is MAC Address Spoofing?

You hear about new types of cyber attacks almost daily. As soon as information security experts have figured out how to deal with one threat, another pops up. One of the latest tricks used by hackers is called MAC address spoofing. MAC spoofing can be used to steal private data from unsuspecting victims. If you…

[Read More]
Sextortion scams are on the rise and targeting teenagers.

Sextortion Scams are On the Rise: What You Need to Know

Sextortion scams are on the rise and increasing exponentially. And they target everyone at any age. But that doesn’t mean everyone is equally at risk. The biggest sextortion targets right now are younger adults and teenagers. Here’s what you need to know about this crime and what you can do about it. What Is Sextortion?…

[Read More]
A hacker using a computer virus for cyber attack

What is a Cyber Attack?

The words cyber attack can cause a racing heart and sweaty palms for anyone who uses the internet. Warnings of these attacks seem to greet us at every turn, and safety precautions when we’re online have become increasingly vital to our security. Cyber criminals look for increasingly sophisticated ways to infiltrate our personal files and…

[Read More]
Bryan Seely talks about wiretapping the FBI and tips to stay safe online

Tips to Stay Safe Online from the Guy who Wiretapped the Secret Service

Cybersecurity experts see security flaws and safety risks online every day. Since their job is to help people and companies stay safe online, they want to tell people about those flaws and help them avoid or fix them. But what are they supposed to do when no one will believe a particular security risk is…

[Read More]