The security business is booming. In the past five years, more than 1,200 startups have joined the game, with Wall Street assigning them record valuations. At the same time, high-profile data breaches...
Forget making the football team or honor society, for teens, social hierarchy is measured by how hefty your follower count is on Twitter. Studies show that while Facebook is still the #1 social network...
Lately, McAfee Labs has observed a lot of active samples detected as Trojan Laziok by many security vendors. According to online reports, the Trojan Laziok is dropped via an exploit of the Microsoft Windows...
Robert Siciliano is Online Safety Expert for Intel Security. He is an identity theft professional who is committed to informing, educating, and empowering users so they can be protected from crime in the physical and virtual worlds. He entered the world of helping protect identities after his small business received its first fraudulent credit card.
In the late 90s, he witnessed the exploding growth of identity theft fueled by Internet access to information, the speed of technology outpacing security and a fundamentally flawed system of identification. For more than 20 years, Robert has been researching and keeping in tune with all aspects of security by staying on top of what is new in the world of both online and offline security.
According to Robert, there always has been, there is now and there will always be a criminal predatory element stalking their next victim. Being proactive and knowing your options are essential.
Learn more: www.mcafee.com/advice.
You’d think that it would be as easy as pie to avoid getting reeled in by a phishing scam. After all, all you need to do is avoid clicking on a link inside an email or text message. How easy is that? A phishing scam is a message sent by a cybercriminal to get you […]
Unfortunately, cyberbullying is prevalent, and a growing threat in today’s always-connected world. Cyberbullying refers to bullying done via computers, or similar technologies, such as cell phones. This kind of bullying usually includes mean or threatening comments, or public posts through texts, emails, voice mails, social media posts, all intended to embarrass the victim. Cyberbullying can […]
The next time you’re in a public place and glued to your smartphone or tablet — whether it’s at the gym, a coffee house, the airport, or just a park bench— know that someone might be peering over your shoulder to see what you’re doing. The snooper could just be curious, or they could be […]
Everyone’s heard of spam as it pertains to emails. Spam isn’t necessarily a malicious message designed to trick you into revealing your credit card number or PayPal login information. But spam is an unsolicited message, sometimes referred to as junk mail. Spam can be very annoying and relentless in nature, often attempting to convince you […]
So just how are hackers able to penetrate all these huge businesses? Look no further than employee behavior—not an inside job, but innocent employees being tricked by the hacker. A recent survey commissioned by Intel Security reveals that five of the top seven reasons that a company gets hacked are due to employee actions. One […]