Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic.Mail forwarding: is a service that allows you to have your mail sent to a “mailbox” and then they will forward... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to, but rather a replacement which retains the existing provisions of the data protection system established by the 1984 legislation. The Act was to come into force from 24 October 1998 but was delayed until 1st March 2000.In addition to data,... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the account numbers and passwords of internet users. They deceive people with faked emails and websites that resembles exactly the originals of well known banks or electronic payment systems. They make people surrender their passwords and account numbers ? and afterwards... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. We all know that the brain runs on chemicals and waves.... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I would stop by to look at his computer. He said it was running abnormally slow and he had found something on his hard-drive he could not explain. I could almost guess what it was he found. Have I been hacked?You... Read More

Social Engineering - The Real E-Terrorism?

One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale. The technical support operator expressed an interest so the hacker sent him an e-mail with a photo of the... Read More

Watching the Watchers: Detection and Removal of Spyware

If spyware were a person and he set himself up in your house, you are likely going to do one of two things. You'll kick him out yourself or you'll call someone (such as the police) to do it for you.Employing tools that detect and remove spyware from your PC,... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've just received an e-mail message, purportedly from the security department at the Bank of the West. The message explains that certain features of my account have been suspended due to "suspicious activity" on my account. The message then provides a... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker.Feeds are simple, really. What's even more exciting is that they are extremely easy to use, and even better, they are... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now, if you'll kindly give me your credit card information and social security number for verification purposes, you will receive this awesome gift!"Now why would they need my credit card or social security number to send me a freebie? Can you... Read More

In The News:

Showing 1 - 10 of 237 Articles
« Previous
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Next »

pen paper and inkwell


cat break through


Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

Online Shoppers, Beware of a New Scam

Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

Phishing: A Scary Way of Life

The Federal Bureau of Investigation has identified "phishing" as the... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

Backup and Save your business!

There you are busily typing away on your PC or... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

3 Things You Must Know About Spyware

1)Spyware is on your system. Like it or not, statistically... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and... Read More

Protection for Your PC - Painless and Free!

Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More