Social engineering is sneaky, as it takes advantage of our natural tendency to be helpful. Social engineers can also play upon human emotions, such as fear and sympathy. Here are some tricks social engineers employ to trick you out of sensitive data, and how you can protect yourself.
Continue Reading… Beware of Social Engineering, a Scam Artist’s Favorite Tool
With the password compromised, the first step is to regain control over the account by changing passwords and checking configuration settings to make sure nothing has changed. However, if the root problem (how the passwords were successfully stolen) is not fixed, then the accounts will just get compromised again and again. That’s why it’s important to take your passwords seriously and to make sure they are strong.
Continue Reading… Why You Should Take Your Passwords Seriously
Another new year means new resolutions! And while we’re not going to push you to exercise more, we do want to encourage you to be more secure when you’re online. So to start 2014 on the right note, we’ve compiled a list of security resolutions you can regularly refer to, so you can stay safe online all year-round.
Continue Reading… Security Resolutions for the New Year
Imitation is the sincerest form of flattery. But not when it involves your identity. Learn some of the many ways thieves commit identity theft, and what steps you can take to protect your good name.
Continue Reading… Identity Theft Epidemic: How Thieves Steal Your Identity Online and Offline
When searching for something on the Web, most people type in a few keywords into a search engine, such as Yahoo!, Google, or Bing and press enter. And by the magic of the Internet, you’re presented with a list of results within a fraction of a second.
Continue Reading… It’s the Most Wonderful Time… for SEO Poisoning!