Don’t Let Your PC Get Held For Ransom

RANSOMWARE_header
“Ransom” may elicit a vision of ships, pirates, and hostages. And while ransoms do take place in dangerous parts of the world, certain forms of ransoms are a lot closer to home. We’re talking about ransomware, malware that holds your computer for ransom and demands some amount of money, to be paid to “unlock” it.
Continue Reading… Don’t Let Your PC Get Held For Ransom

Protecting Kids Online

Keeping Kids Safe Online_header
With kids accessing the Internet to check their email, to browse the Web and play online games, or just to stay connected with friends and family through chat or social networking services, the risk of being exposed to many online dangers becomes very real. Here in our infographic, we address some of the online dangers kids could face, ways they can be exposed, and a few steps parents can take to keep their kids safe.
Continue Reading… Protecting Kids Online

What to Do When Your Device is Stolen

STOLEN DEVICE_HEADER
Your iPhone or iPad probably has your entire life on it—from photos, apps, contacts, and communications. What would you do if it is ever stolen?

There are some preemptive measures you can take to make the loss less traumatic in the event your device does get stolen.
Continue Reading… What to Do When Your Device is Stolen

What Apps Have Access to Your Facebook and Twitter?

Facebook and Twitter apps access_header

While social media sites such as Facebook and Twitter make it easy to share things with your friends, they also make it easy to log in to various services and applications, too. As authentication brokers, Facebook and Twitter let users use their account credentials to sign into third-party sites. To do so, the user has to give permission for those sites to access their profile data.

Facebook is a full-blown apps ecosystem. You may have added an app to take advantage of a promotion or contest, played a game, or added new functionality such as music streaming. In most cases, it just means the app developer has access to some of your profile data. In the worst-case scenario, a malicious developer behind the service can use your account to send out spam.
Continue Reading… What Apps Have Access to Your Facebook and Twitter?