Take it from me: sitting on the sideline is no way to make it to the top. Even if ‘the top’ isn’t your destination, to experience career success in some form requires active assessment and thoughtful...
Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time). And, although we hear about breaches and security...
McAfee Labs provides important information about threats in a variety of ways, from our McAfee Global Threat Intelligence service that feeds into many of our products, to published Threat Reports, our...
Robert Siciliano is Online Safety Expert for Intel Security. He is an identity theft professional who is committed to informing, educating, and empowering users so they can be protected from crime in the physical and virtual worlds. He entered the world of helping protect identities after his small business received its first fraudulent credit card.
In the late 90s, he witnessed the exploding growth of identity theft fueled by Internet access to information, the speed of technology outpacing security and a fundamentally flawed system of identification. For more than 20 years, Robert has been researching and keeping in tune with all aspects of security by staying on top of what is new in the world of both online and offline security.
According to Robert, there always has been, there is now and there will always be a criminal predatory element stalking their next victim. Being proactive and knowing your options are essential.
Learn more: www.mcafee.com/advice.
Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I smell a rat. Literally, a RAT. A RAT or remote administration tool, is software that gives a person full control a tech device, remotely. The RAT gives the user access to your system, just as […]
If you haven’t realized it by now, here’s fair warning (especially for the guys)—Saturday is Valentine’s Day. And, if you’re like me it’s yet another day that I have to remember on the calendar besides my anniversary and wife’s birthday to buy overpriced flowers or candy for the hubbub around this holiday. Unfortunately, cybercriminals use […]
I really enjoy reading blogs. And since you are here, reading my blog post, I’m guessing you do too. Blogs are a great way of gaining information and learning about different perspectives on a wide variety of topics. Unfortunately, spammers have tainted this medium with splogs. The word splog is a combination of the words […]
A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit would be a burglar breaking into your house. The burglar is dressed all in black, so that his form blends into the darkness. He tiptoes around to hide his sounds so he’s more likely to […]
Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time). And, although we hear about breaches and security flaws in the news, it seems like a lot of us don’t think it applies to ourmobile device. Here are […]