The security business is booming. In the past five years, more than 1,200 startups have joined the game, with Wall Street assigning them record valuations. At the same time, high-profile data breaches...
Forget making the football team or honor society, for teens, social hierarchy is measured by how hefty your follower count is on Twitter. Studies show that while Facebook is still the #1 social network...
The packaging of malware and malware-construction kits for cybercrime "consumers" has been a long-running trend. Various turnkey kits that cover remote access plus botnet plus stealth functions are available...
Robert Siciliano is Online Safety Expert for Intel Security. He is an identity theft professional who is committed to informing, educating, and empowering users so they can be protected from crime in the physical and virtual worlds. He entered the world of helping protect identities after his small business received its first fraudulent credit card.
In the late 90s, he witnessed the exploding growth of identity theft fueled by Internet access to information, the speed of technology outpacing security and a fundamentally flawed system of identification. For more than 20 years, Robert has been researching and keeping in tune with all aspects of security by staying on top of what is new in the world of both online and offline security.
According to Robert, there always has been, there is now and there will always be a criminal predatory element stalking their next victim. Being proactive and knowing your options are essential.
Learn more: www.mcafee.com/advice.
You’ve probably heard of people storing information in “the cloud,” but what does that really mean, and is it safe to put your data there? The cloud is best described as a network of servers offering different functions. Some servers allow you to store and access data, while others provide an online service. You may […]
You’d think that it would be as easy as pie to avoid getting reeled in by a phishing scam. After all, all you need to do is avoid clicking on a link inside an email or text message. How easy is that? A phishing scam is a message sent by a cybercriminal to get you […]
Unfortunately, cyberbullying is prevalent, and a growing threat in today’s always-connected world. Cyberbullying refers to bullying done via computers, or similar technologies, such as cell phones. This kind of bullying usually includes mean or threatening comments, or public posts through texts, emails, voice mails, social media posts, all intended to embarrass the victim. Cyberbullying can […]
The next time you’re in a public place and glued to your smartphone or tablet — whether it’s at the gym, a coffee house, the airport, or just a park bench— know that someone might be peering over your shoulder to see what you’re doing. The snooper could just be curious, or they could be […]
Everyone’s heard of spam as it pertains to emails. Spam isn’t necessarily a malicious message designed to trick you into revealing your credit card number or PayPal login information. But spam is an unsolicited message, sometimes referred to as junk mail. Spam can be very annoying and relentless in nature, often attempting to convince you […]