Last updateSun, 09 Apr 2017 3pm

Back You are here: Home Security

Security Security

10 Steps for Dealing with Dangerous Messages

This was taken from eWeek to stress the importance in dealing with dangerous messages. It contains trend facts and how you can help protect yourself. In summary, authorities and many companies have been taking down dangerous botnets that helped drive down the amount of spam flooding into businesses and consumer email accounts. Nevertheless, we are still not free from dangerous emails.

Read more ...

Compromised Email

Many companies experienced high-profile data breaches. Even government agencies weren't exempted. Sony, Epsilon, the state of Texas and several others have failed to protect data on thousands and even millions of customer accounts.

Read more ...

Is Internet Cookie OK?

You will find cookies in your Internet browser such as the Internet Explorer, Fire Fox, Opera, and Safari. Cookies are generally small text files that are stored in your computer's browser directory or program data subfolders. Cookies are created when you use your browser to visit websites and generally are beneficial.

Read more ...

Spammed Email

Spam email has been a problem pretty much since the beginning of the Internet. Over the last several years, it has gotten progressively worst and has been a challenge to control. Security experts estimated that about 90% of the world’s emails are spammed.

Read more ...

What is Ransomware

This is serious stuff, so let’s keep the definition simple. We know what ransom is, right? “Ransom” is a sum of payment commonly money, demanded or paid for release of something. Parsing the “ware” part is software installed that would invoke the ransom threat on your data files, folders, or your whole computer. The ransom may start at $500.00 and increase as you refuse or delay to pay the ransom.

Read more ...

Internet Tracking While Browsing

While browsing the Internet for information or shopping with your favorite web browser, websites you visited can track your Internet access location? Did you know that this is a could default setting in your browser (Internet Explorer, Firefox, Chrome, Safari, Opera, and others) to allow this tracking? For many known and good websites, this is would OK. But there are a good number of websites are potential threats.

Read more ...

Do You Have Bloatware?

You bought a new computer and found many programs already on it that you did not ask for and none of them look at all important. Many of these seem to be free trials and you've never heard of most of them. These programs are typically called bloatware. Software bloat is a term used to describe the tendency of newer computer programs to have a larger installation footprint, or have many unnecessary features that are not used by end users.

Read more ...

Do Not Do This!

You received a phone call from someone with a foreign accent. That person identified themselves as part of the Microsoft support team explaining a severe issue with your computer that need to be fixed. That phone call will attempt to continue to get information and your charge card to "fix the issue". DO NOT DO THIS! This is a scam.

Read more ...


Emails is one of a number of avenues that can a threat to your computer and network.

Internet activities such as browsing and shopping can be tracked by hackers, advertising companies, and websites.

Malwares are malicious software such as Trojan horses, viruses, spywares, and in many cases unwanted programs. They all can and will cause security threat problems.