First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic.Mail forwarding: is a service that allows you to have your mail sent to a “mailbox” and then they will forward... Read More
The 1998 Data Protection Act was not an extension to, but rather a replacement which retains the existing provisions of the data protection system established by the 1984 legislation. The Act was to come into force from 24 October 1998 but was delayed until 1st March 2000.In addition to data,... Read More
So called phishers try to catch the information about the account numbers and passwords of internet users. They deceive people with faked emails and websites that resembles exactly the originals of well known banks or electronic payment systems. They make people surrender their passwords and account numbers ? and afterwards... Read More
First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. We all know that the brain runs on chemicals and waves.... Read More
A friend called me one day and asked if I would stop by to look at his computer. He said it was running abnormally slow and he had found something on his hard-drive he could not explain. I could almost guess what it was he found. Have I been hacked?You... Read More
One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale. The technical support operator expressed an interest so the hacker sent him an e-mail with a photo of the... Read More
If spyware were a person and he set himself up in your house, you are likely going to do one of two things. You'll kick him out yourself or you'll call someone (such as the police) to do it for you.Employing tools that detect and remove spyware from your PC,... Read More
"Dear Bank of the West customer", the message begins. I've just received an e-mail message, purportedly from the security department at the Bank of the West. The message explains that certain features of my account have been suspended due to "suspicious activity" on my account. The message then provides a... Read More
Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker.Feeds are simple, really. What's even more exciting is that they are extremely easy to use, and even better, they are... Read More
"You've just won a fabulous vacation or prize package! Now, if you'll kindly give me your credit card information and social security number for verification purposes, you will receive this awesome gift!"Now why would they need my credit card or social security number to send me a freebie? Can you... Read More
![]() |
|
![]() |
|
![]() |
|
![]() |
|
|||||
|
|
|
"You've just won a fabulous vacation or prize package! Now,... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Working from home has its advantages, including no commute, a... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
To blog or not to blog? Well, why not? Lots... Read More
Over £5 billion pounds was spent on online shopping in... Read More
Over the past few years as the internet has become... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
While clicking from site to site on the internet you... Read More
There you are busily typing away on your PC or... Read More
A few nights ago I received an email from "2CO"... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
A new variation of the Nigerian Scam theme ... Read More
When surfing the Internet you probably take your anonymity for... Read More
Have you ever got an email asking you to confirm... Read More
When the Internet first came about, it was realized it... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Many of us have run into an annoying and time-consuming... Read More
If you know what is the 'Fishing' then it's very... Read More
You can detect spyware online using free spyware cleaners and... Read More
Long gone are the days that we could feel secure... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Watching how the traditional media covers the latest virus or... Read More
Every single time you access a website, you leave tracks.... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
A friend called me one day and asked if I... Read More
If you have used a Windows machine for a while,... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
This is the second in a series of articles highlighting... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
In 1997, I decided after 15 years as a practicing... Read More
Internet scams and frauds are on the rise! The quantity... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
Do you sometimes notice your computer running slower. Is your... Read More
It has been said that with the wealth of information,... Read More
Phishing is the act of some individual sending an email... Read More
The Internet is a vast International Network of people and... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Viruses are, however, not the only malicious software programs out... Read More
We all know that it's dangerous to use the same... Read More
Ok, you've got a computer, and you get online. You... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
Nowadays more and more people are using a computer. A... Read More
This is not some new fangled techno-speak, it is a... Read More
With the advent of the World Wide Web, a whole... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
My first experience with a spyware BHO based infection was... Read More
Business on the internet is getting down right shameless. This... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Over £5 billion pounds was spent on online shopping in... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
These six ways to prevent identity theft offer you valuable... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
The average computer is packed with hidden software that can... Read More
Identity Theft is one of the most serious problems facing... Read More
With the Internet entering our lives in such an explosive... Read More
This is the second in a series of articles highlighting... Read More
While clicking from site to site on the internet you... Read More
You may not realize it, but as you are surfing... Read More
The words Corporate Security may conjure up images of a... Read More
Let us take the example of scrambling an egg. First,... Read More
First off I should explain what phishing is. Phishing is... Read More
If you are a parent, you have probably wondered at... Read More
Paypal is a great site and is used by many... Read More
Internet Security |