7 Ways to Spot a Phishing Scam

Phishing scams_header

It’s early in the morning, and you’ve just made a cup of coffee. You’re checking your email when you see one from PayPal, informing you there is an issue with your account and to ‘click here’ to verify your account. The email even features the official PayPal logo.

Because it’s early and your coffee hasn’t kicked in yet, you might think the email is legitimate and click the embedded link or attachment. And you might end up sorry if you did. If you’d taken a closer look, you’d have realized it was a phishing email.
Continue Reading… 7 Ways to Spot a Phishing Scam

Are You Making Yourself a Victim of Cybercrime?

Victim of cybercrime

Did you know some things you do on the Web could actually be putting your PC and personal information in jeopardy? Here are some mistakes and misconceptions that could make you a victim of cybercrime, and what you should do to minimize your risk of becoming part of the statistic.
Continue Reading… Are You Making Yourself a Victim of Cybercrime?

What You Need To Know About Peer-to-Peer File Sharing

P2P_header

BitTorrent. uTorrent. The Pirate Bay. These are just a few of the many popular peer-to-peer (P2P) file sharing sites you’ve probably heard of. Since its increase in popularity in the late 1990s, P2P file sharing has had its fair share of backlash for enabling illegal activity. Run a Google News search on peer-to-peer file sharing, and you’d find headlines like:

“Barre man charged with promoting child pornography.”

“Is the free download of uTorrent legal?”

“Illegal downloaders in federal court’s crosshairs.”

There’s another aspect to P2P that has traditionally caused concern: computer security and privacy risks. Continue Reading… What You Need To Know About Peer-to-Peer File Sharing