Watch Episode Two of "The Most Dangerous Town on the Internet- Where...
Today we are proud to announce the launch of the second installment in our documentary series "The Most Dangerous Town on the Internet." In episode one, we visited the town Râmnicu Vâlcea, which is...
View ArticleAdobe Issues Emergency Patch for Newly-Discovered Flash Vulnerability
The discovery of a critical Adobe Flash Player zero-day vulnerability, CVE-2016-1010, “that could potentially allow an attacker to take control of the affected system” prompted Adobe to issue an...
View ArticleHow to Spot Baseball Spring Training Scams
As winter drags on, almost everyone starts to look forward to spring — but perhaps no group looks forward to March quite as much as true-blue baseball fans. After all, its arrival means Cactus League...
View ArticleSneaky Spammer Tactics and How To Avoid Them
Spam is a problem on the Internet, coming at us from just about every angle of the online space. Some spammers develop sophisticated, well-planned strategies, while others can be sloppy and still drive...
View ArticleBurrp Compromised. Angler Exploit Kit Delivers TeslaCrypt Ransomware
Cybercriminals regularly use exploit kits to innovatively find vulnerabilities in systems and infect users with malware. An exploit kit opens a medium for cyber criminals to communicate with your...
View Article4 Steps to Make Your Smart Home More Security Smart
“IoT” is an acronym for the “Internet of Things.” And any device that can connect to the Internet and transmit or receive data can be considered a “smart” thing. That includes smart homes, also known...
View ArticleMajor News-Sites Hit With Large-Scale Malvertising Campaign
Just when you think the Angler Exploit Kit is wreaking havoc to its full potential, it surprises us by getting more aggressive.Last weekend several mainstream websites, fell victim to a massive...
View ArticleHow Can I Access the Deep Web?
Believe it or not, accessing the deep web is easier than you think. In fact, you’ve probably already done it. The media hasn’t done a great job of differentiating what’s considered deep web, and what...
View ArticleExploring the Deep Web
There are multiple “layers” to the Internet that you may not be aware of. The first, or top layer is called the surface web, and it is the part of the web that is crawled by search engines. That’s the...
View Article5 Ways You Can Help Yourself Stay Secure Online
When you’re using the Internet, your Internet security suite can only go so far to protect you from potential dangers like spyware, ransomware and malware. You have to do some of the work yourself,...
View ArticleThe Dos and Don’ts of Using Public Wi-Fi
Public Wi-Fi is available just about everywhere, from the local coffee shop to the hotels and airports you visit while traveling. Wi-Fi has made our lives a little easier, but it also poses security...
View ArticleNew Software Updates From Apple Address Two Critical Vulnerabilities
It’s time to patch ALL the Apple things! Apple has released a slew of software updates this week for various products. Most importantly, the updated iOS 9.3.In March there were two vulnerabilities...
View ArticleSymantec Financial Threats Report Gives Consumers Security Tips
It’s tax season, so our finances are top of mind for many of us. Cybercriminals are thinking about our money, too. After all, most cybercrimes are committed for monetary gain. According to the Symantec...
View ArticleWhat Are Some of the Laws Regarding Internet and Data Security?
Numerous laws in the U.S. cover Internet, data security, and privacy in the United States, with the 1974 Privacy Act arguably being the foundation for it all. The Privacy Act passed to establish...
View ArticleWhy March Madness Is Bad for Business
Every spring the NCAA college basketball tournament — known as March Madness — turns workplaces into play spaces. Betting on brackets and watching games seem more suited to sports bars, but since many...
View ArticleOS X Bug leaves Systems Vulnerable to Attack
There’s a perception that OS X is impenetrable, especially when compared to Windows. In recent times this assumption is being proven wrong.The latest in a series of flaws discovered in OS X and iOS is...
View ArticleThe Importance of Data Back-Up
Have you ever lost a lot of really important data? Or, alternately, have you ever had a moment of panic where you thought you did? Whether it’s images of a family vacation, a report from work or a...
View ArticleAndroid Lockdroid Variants Target Western Regions and Japan
One of the most prevalent Android ransomware threats in the West has now expanded to Asia, choosing Japan as its first target. Android.Lockdroid was spotted on March 11th, and disguises itself as a...
View ArticleFour Tax Scams to Watch out for This Tax Season
Benjamin Franklin once said that the only certain things in life are death and taxes. While individuals, businesses, and tax preparers get ready for tax season at the beginning of each year, another...
View ArticleHow to Use Your New PC or Mobile Device Safely Online
There are more mobile devices on our planet than there are people. It is no surprise that our daily and digital lives have become a seamless unit of existence. Just like your real life, your digital...
View Article