Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot of advertising to promote my website, but here I am online and on the phone, giving my personal information to.....who? Strangers basically, Geez! The majority of identity thefts occur thru contractors employing people in entry-level jobs that have not been... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint submissions for 2004, an increase of 66.6% from 2003. The total dollar loss from all referred cases exceeded 68 million dollars, an average loss of $894 per complaint. There are many types of internet frauds that exist including auction, email,... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital warning been needed for current and potential IM buddies who chat on line.John Sakoda of IMlogic CTO and Vice President of Products stated that,"IM viruses and worms are growing exponentially....Virus writers are now shifting the focus of their attack to... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic.Mail forwarding: is a service that allows you to have your mail sent to a “mailbox” and then they will forward... Read More

Why you Must Secure your Digital Product and Thank You Web Page

A couple of years back, I paid my dues the 'hard way'.My web site was up and running, the sales letter had been 'crafted' with the most influential marketing techniques and the profits had been consistently coming-in, until...Until I noticed a considerable 'drop in ClickBank sales' for 2 months in... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. That "person" is our... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the internet is quick, convenient and is probably safer than you think. However, you still need to be aware that it is essential to vigorously protect your privacy and financial information when making purchases online.If you take the necessary precautions to... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories which are explained in detail below:VirusesComputer Viruses are small pieces of software that attach themselves to real programs. An example would be a virus that attaches itself onto windows explorer. Each time you run the program windows explorer the virus... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance. Or if one of your employees is leaking confidential information on the side. These tools will allow you to find out the truth and get the evidence you can present... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in the first part of the article, "Make Money Online - The Latest Scam Disclosed", "refund policy scammers" affect the websites that make money online by selling digital products by buying the product and asking for refunds, while keeping the product.Now... Read More

In The News:

Showing 1 - 10 of 237 Articles
« Previous
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Next »

pen paper and inkwell


cat break through


Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More

Its War I Tell You!

There are ways to insure security though. You can get... Read More

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

Protection for Your PC - Painless and Free!

Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More

How Can Someone Get Private Information From My Computer?

From the "Ask Booster" column in the June 17, 2005... Read More

The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

What is Spyware?

The most frustrating part of having Spyware on your computer... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Phishing, Fraudulent, and Malicious Websites

Whether we like it or not, we are all living... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

How To Avoid Hackers From Destroying Your Site?

Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More

A Personal Experience with Identity Theft

Some months ago, before there was much publicity regarding phishing... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or... Read More

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More