Windows 8 Security Tips
Windows 8 is being touted as a major change in the way that people will use and interact with their PCs, tablets and other devices. Much of the change is
1147 articles
Windows 8 is being touted as a major change in the way that people will use and interact with their PCs, tablets and other devices. Much of the change is
Those looking to tighten the security of their internet browsing experiences have a lot of choices these days. There is a slew of security and privacy related plug-ins available for
Computer viruses are scary, but they don’t always sound it – often their names are misleadingly bland or deceptive. The I Love You virus wreaked havoc in banks and security
When it comes to computers, usability and security aren’t always mutually inclusive concepts. Most times, the easier a system is to use the less protected it is. The tools used
The world of Web apps has grown at a breakneck pace in recent years. That’s been good news for consumers and it’s been utterly fantastic news for attackers, who have
If you’ve used the Internet for more than seven minutes, you’ve probably been targeted by several hundred phishing attacks. Phishing, when attackers try to pry bank account numbers, codes and
You can tell your kids to stay off the social networks and you can tell yourself that they’ll listen, but chances are they’ll find a way on, anyway. So we’re
In terms of security it’s not the one who has more talented programmers who creates the best protection. Instead, it’s often the one who’s been attacked the most who’s forced
Wireless Internet access has to go down as one of the handful of best technological advances in the last 10 years. It’s hard to even remember what it was like
The phrase targeted attack looks to be redundant at first glance. Of course an attack is targeted. What good would it be without a target? But the reality is that
If you’re a regular DropBox user, you may have noticed that your inbox has been full of spam this summer. Well, DropBox noticed it too (they had it pointed out
PROS Awesome design First of all, the Metro interface looks amazing. It is very light, clean and simple. The user experience is a result of the developer’s abilities to follow
Hacking someone’s personal email account is the best way to control their online presence, and new research shows that it is frighteningly easy to do just that. A recent study