What the Heck are Zero-Day Attacks? (And 3 Ways to Avoid Them)

Hackers look for vulnerabilities that they can exploit.

Hackers look for vulnerabilities that they can exploit.

 

If you look for the term zero-day attack in your home dictionary, you probably won’t find it.

Go ahead and check…I’ll wait.

You might not even find the term in some online dictionaries (though to be fair, it does appear in others.).

Nevertheless, if you google the term, you’ll find thousands of references to it, many of them from mainstream sources including Forbes, Time, and USA Today. So what’s the deal? If the term is so important, why isn’t in the dictionary yet?

As with so many computer-related terms, the phrase zero-day attack has recently crept into the lexicon of the common person, after being used by technical types for more than a decade. Also known as 0day attacks, zero-hour attacks and 0hour attacks, these are attacks that exploit a vulnerability in a computer application or program.

A vulnerability, by the way, is simply an error in a software that could be exploited. It isn’t a problem in itself, and it isn’t something that stops an application or program from working properly. However, if a vulnerability is discovered by a hacker, and if the hacker uses the vulnerability to conduct nefarious activities, then the moment these nefarious activities are discovered, it is known as a zero-day attack.

 

 

 

Read more…


9 Ways to Avoid Online Shopping Traps (Just in Time for Mother’s Day)

Flowers are a great Mother's Day gift.

Want your Mother’s Day flowers to arrive? Order from a trusted and reputable site.

 

So it’s a week or so before Mother’s Day and you’re thinking about what to get for your mom. Buy her a book on Amazon? Send her a bouquet of flowers via an online florist? Buy tickets online for an upcoming show?

If you’re like millions of sons and daughters, you’ll probably shop for your mother online this year. It’s a great convenience, that’s true, but it also poses hazards. After all, though online shopping is handy, it can lead to trouble.

The potential dangers of online shopping certainly don’t mean your mother should be deprived of a gift this year. Heaven forbid! And they also don’t mean you need to drive cross-country to drop off your gift in person (though she might appreciate that). What they do mean is that if you want to shop online and not get burned, you need to take some precautions.

Here are 9 ways to avoid online shopping traps – just in time for Mother’s Day. Of course, we recommend keeping these tips in mind all year long – your mother will be glad you did!

Read more…


4 Ways to Protect Your Privacy on Public WiFi

Public Wifi is convenient, but is it safe?
Public Wifi is convenient, but is it safe?

Internet cafés are so 2014. Today, almost every café worth its coffee beans offers free public WiFi. So do fast food restaurants, bus stops, intercity trains, airports, malls, libraries, hotels, and public toilets. Yes, even public toilets.

But the fact that WiFi is public and free doesn’t mean that it’s safe. To the contrary, it could be quite dangerous. Because if WiFi is free and accessible to you, then it’s free and accessible to everyone, including hackers.

WiFi On the Go – What You Need To Know

When you use free WiFi, you open up your device and communications to anyone else using that same free network. And though many people may be checking their email and updating their Facebook status just like you, others may be looking for their next online victim.

If you’re on public WiFi and your device is unprotected, hackers can access crucial personal information in seconds.

Read more…


The Year of the Hack: How to Prevent Your Personal Data from being Hacked

YEAR OF THE HACK_header

When hackers breach banks and retailers, there’s not much you can do. Fortunately, there are some things you can do to protect your personal data from falling into the wrong hands.

 

 

 

 

 

 

 

Continue Reading… The Year of the Hack: How to Prevent Your Personal Data from being Hacked


How Valuable is Your Email Account to Hackers?

hacked email account_HEADER

Your email archive is full of information that’s valuable to you—and to cybercriminals.

The combination of plentiful email storage and relaxed password practices enable criminals to do their worst. Many Web-based email systems now offer multiple gigabytes of storage for free. For example, Google gives you 15GB to share across Gmail, Google Drive, and other Google services. With all that free storage, you may be using your email account as a kind of searchable archive of important data. And you probably don’t delete messages that you might have erased in the past. With gigabytes of storage, why bother? You may need those messages for reference later.
Continue Reading… How Valuable is Your Email Account to Hackers?


Recent Tweets