Social engineering is sneaky, as it takes advantage of our natural tendency to be helpful. Social engineers can also play upon human emotions, such as fear and sympathy. Here are some tricks social engineers employ to trick you out of sensitive data, and how you can protect yourself.
Continue Reading… Beware of Social Engineering, a Scam Artist’s Favorite Tool
With the password compromised, the first step is to regain control over the account by changing passwords and checking configuration settings to make sure nothing has changed. However, if the root problem (how the passwords were successfully stolen) is not fixed, then the accounts will just get compromised again and again. That’s why it’s important to take your passwords seriously and to make sure they are strong.
Continue Reading… Why You Should Take Your Passwords Seriously
There is more than one type of burglary that can affect your home. One involves kicking in the door; another involves compromising your computer. And if the intruder in this scenario has compromised your wireless network, you might as well have given them a key to the front door.
Continue Reading… How to Prevent Your Home WiFi From Being Burglarized
Another new year means new resolutions! And while we’re not going to push you to exercise more, we do want to encourage you to be more secure when you’re online. So to start 2014 on the right note, we’ve compiled a list of security resolutions you can regularly refer to, so you can stay safe online all year-round.
Continue Reading… Security Resolutions for the New Year
Imitation is the sincerest form of flattery. But not when it involves your identity. Learn some of the many ways thieves commit identity theft, and what steps you can take to protect your good name.
Continue Reading… Identity Theft Epidemic: How Thieves Steal Your Identity Online and Offline