Virus damage estimated at $55 billion in 2003. "SINGAPORE - Trend Micro Inc, the world's third-largest anti-virus software maker, said Friday that computer virus attacks cost global businesses an estimated $55 billion in damages in 2003, a sum that would rise this year. Companies lost roughly $20 billion to $30... Read More
If you constantly deal with bank or electronic accounts, it must be your worst nightmare--to wake up and learn that you are a bankrupt. Some crook stole your personal data and all the money you have been sweating blood for years has flown to somebody else's account. Almost everybody must... Read More
As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming. Does it differ from phishing -- and if yes, how?Two PharmingsActually, two completely different fields use the term "pharming" now.... Read More
History and BackgroundThe virus was one of the first ever threats to computer security. It brought a whole new fear upon computer users. Bugs and glitches could cause damage unintentionally, but a virus created havoc intentionally, and therefore often caused much more damage then just glitches in software. Technically a... Read More
It has been said that with the wealth of information, freely available, the Internet has the ability to make you smarter, faster, than any other medium on the planet. Of course with an equal amount of mis-information, it also has the ability to make you dumber, faster, than any other... Read More
No auntie Sookie, not earth worms, computer virus worms that can get to you computer and slowly dig deep into your files and eat them away. Put that eggnog down and I'll tell you some more about these new worms.This worm is a self-replicating (makes a copy of itself, aunt... Read More
You've seen it in the news - 40 million credit cards exposed!With all the news about web sites being hacked and cyber thieves stealing credit card numbers and other personal data, it's no wonder that some shoppers are still hesitant to provide payment information online. You don't have to be.Is... Read More
Huge number of spyware software applications are available in the market, some being offered as shareware while rest as freeware. (Shareware means a software available for download / CD, and can be used for a particular length of time, usually 30 days. Some are disabled as well). Before making a... Read More
When we think of adware, what comes to mind are those annoying and pesky ads that pop up out of nowhere whenever we are surfing the net. Anybody who has surfed through the net has encountered those irritating pop-up adwares advertising everything from computer software down to Viagra. Adwares are... Read More
Internet scams and frauds are on the rise! The quantity of scam emails with various fraud schemes any email account receives today is simply overwhelming! There is this infamous Nigerian 419 scam, which is by far the most widely circulated one. I wrote about it in one of our ezine... Read More
![]() |
|
![]() |
|
![]() |
|
![]() |
|
|||||
|
|
|
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
Credit card fraud is a growing problem for online businesses... Read More
When the Internet first came about, it was realized it... Read More
If you use emails actively in your communication, you must... Read More
You may not realize it, but as you are surfing... Read More
It's late. You've been scouring the web for that perfect... Read More
Every now and then you can read about a new... Read More
The Message Must Get Through The year is 300A.D.,... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
This is not some new fangled techno-speak, it is a... Read More
Ok, you've got a computer, and you get online. You... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
The average computer is packed with hidden software that can... Read More
There you are busily typing away on your PC or... Read More
As more people are logging onto the Internet everyday, Network... Read More
These six ways to prevent identity theft offer you valuable... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
A new variation of the Nigerian Scam theme ... Read More
In 1997, I decided after 15 years as a practicing... Read More
If you have used a Windows machine for a while,... Read More
Identity theft rates one of the fastest growing crimes in... Read More
There is nothing more important that password security in world... Read More
They're out there. Individuals trying to make a quick buck... Read More
The Internet is a vast International Network of people and... Read More
Shopping for horse gifts or other gift items on the... Read More
You and I are a lot alike. We are both... Read More
Ebay is a great site and is used by many... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
If you run any type of Internet business, Adware and... Read More
Well, if that would have been said to me by... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Phishing is the act of some individual sending an email... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
Spyware is software that runs on a personal computer without... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
As more people are logging onto the Internet everyday, Network... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
File sharing on p2p is soaring despite the music and... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
The Threat10 years ago you could probably have run no... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Security leaks can be a big problem for any site... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
History and BackgroundThe virus was one of the first ever... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
A week or so ago, I received an inquiry from... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Over the past few years as the internet has become... Read More
With the Internet entering our lives in such an explosive... Read More
Every now and then you can read about a new... Read More
Internet scams and frauds are on the rise! The quantity... Read More
Nowadays more and more people are using a computer. A... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
Internet Security |