Data collection and the NSA

China is commonly thought to be the opposite of the US, but for one city: Hong Kong. Hong Kong is arguably one of the freest societies on Earth, and has recently been the refuge of one of America’s biggest whistleblowers. In early June, Edward Snowden, an ex NSA (National Security Agency) consultant exposed data collection […]

Five ways to secure your business

When it comes to computers and other similar systems, many business owners know they have to think seriously about security. However, they often lack the time or funds to actually take the necessary steps to ensure their systems are as secure as they should be. The fact is that security can be as costly or […]

4 types of password management systems

The Internet has undoubtedly made our lives easier, and some would even say better. It is a bit of a double edged sword however, as we have seen an increase in the number of security breaches and hacks exposing our information. One way to minimize data being exposed or stolen is to use different passwords […]

50 million LivingSocial accounts hacked

Cyber crime has been around since the very early days of the Internet and has it has become an increasingly serious problem as the number of Internet users has increased. This trend is likely to continue, and you can be guaranteed that you’ll continue to see news about websites being hacked and valuable information exposed. […]

5 ways to insecure passwords

Chances are high that you already take great steps to ensure that your network and systems are secure from threats. But, do you take the same steps to ensure that your accounts like email, social media, bank, etc. are also secure? The weakest link of these accounts is the password, and that’s exactly where most […]

Email fraud – 5 tips to help you spot it

Business owners and managers have many concerns they must address on a regular basis, or at least be aware of. Some of security concerns revolve around fraud, more specifically email fraud. While this isn’t a new concept, email fraud and scam occurrences are on the rise, and it is vital to know how to spot […]

5 common virus myths dispelled

It can be argued what the most important invention of the last 100 years has been, but many would agree that the computer has to be among the top. These complex machines helped usher in the information age. Unfortunately, they come with a downside: Destructive malware such as viruses have become a major problem for […]

Site tracks changes to Terms of Service

One of the more popular debates about the Internet is who exactly owns your data and information when it goes online? Most of the information regarding this is held in the Terms of Service, which most people click and agree to without reading. The interesting thing about this is that web oriented companies usually update […]

Hunt for your devices with Prey

Imagine you are in the airport waiting for a flight when you look down only to discover that your laptop is missing. This isn’t a great thought, especially since many of us have important files and programs that we can’t afford to lose. The problem is, if your device has gone missing, the chances of […]

Twitter sees security breach

For many, social media is a deeply ingrained part of daily life. For companies it’s become an integral part of their marketing and communications strategy. Because of this, the security of these services is something users expect. 99% of the time. However, there are breaches that can cause trouble for users. It only took one […]