What Choosing Pizza Toppings and Antivirus Software Have In Common

 

Choose your toppings!

Most people choose their pizza toppings according to taste…and rightly so!

 

If you’re like most people who order pizza, how you choose toppings is pretty intuitive. If you like salty flavors, you opt for olives and anchovies; if you prefer sweet flavors, you choose pineapples and corn. If you’ve got a sense of culinary adventure, a combination of hot peppers, spiced pepperoni and buffalo mozzarella may tickle your fancy. In all cases, choosing pizza toppings is a matter of taste, and there’s no need to take it too seriously, really, since it’s just pizza after all.

Selecting the right antivirus is considerably more important, and should be approached in a more informed manner. After all, this isn’t dinner we’re talking about. It’s your personal computer. It’s your private information, your banking details, your personal email, your family photos, and your confidential files. The decision you make regarding how you protect it should be a sensible one based on facts and research, not your sense of taste.

Read more…


What the Heck are Zero-Day Attacks? (And 3 Ways to Avoid Them)

Hackers look for vulnerabilities that they can exploit.

Hackers look for vulnerabilities that they can exploit.

 

If you look for the term zero-day attack in your home dictionary, you probably won’t find it.

Go ahead and check…I’ll wait.

You might not even find the term in some online dictionaries (though to be fair, it does appear in others.).

Nevertheless, if you google the term, you’ll find thousands of references to it, many of them from mainstream sources including Forbes, Time, and USA Today. So what’s the deal? If the term is so important, why isn’t in the dictionary yet?

As with so many computer-related terms, the phrase zero-day attack has recently crept into the lexicon of the common person, after being used by technical types for more than a decade. Also known as 0day attacks, zero-hour attacks and 0hour attacks, these are attacks that exploit a vulnerability in a computer application or program.

A vulnerability, by the way, is simply an error in a software that could be exploited. It isn’t a problem in itself, and it isn’t something that stops an application or program from working properly. However, if a vulnerability is discovered by a hacker, and if the hacker uses the vulnerability to conduct nefarious activities, then the moment these nefarious activities are discovered, it is known as a zero-day attack.

 

 

 

Read more…


9 Ways to Avoid Online Shopping Traps (Just in Time for Mother’s Day)

Flowers are a great Mother's Day gift.

Want your Mother’s Day flowers to arrive? Order from a trusted and reputable site.

 

So it’s a week or so before Mother’s Day and you’re thinking about what to get for your mom. Buy her a book on Amazon? Send her a bouquet of flowers via an online florist? Buy tickets online for an upcoming show?

If you’re like millions of sons and daughters, you’ll probably shop for your mother online this year. It’s a great convenience, that’s true, but it also poses hazards. After all, though online shopping is handy, it can lead to trouble.

The potential dangers of online shopping certainly don’t mean your mother should be deprived of a gift this year. Heaven forbid! And they also don’t mean you need to drive cross-country to drop off your gift in person (though she might appreciate that). What they do mean is that if you want to shop online and not get burned, you need to take some precautions.

Here are 9 ways to avoid online shopping traps – just in time for Mother’s Day. Of course, we recommend keeping these tips in mind all year long – your mother will be glad you did!

Read more…


USB Drives: Are You Plugging Malware
into Your PC?

Plugging malware into PC_header
It’s safe to say at one point or another, we’ve all used USB drives to transfer and retrieve files from one computer to the next. As convenient as USB drives are for this purpose, it’s also extremely easy for attackers to distribute malware in the same fashion.
Continue Reading… USB Drives: Are You Plugging Malware into Your PC?


Don’t Let Your PC Get Held For Ransom

RANSOMWARE_header
“Ransom” may elicit a vision of ships, pirates, and hostages. And while ransoms do take place in dangerous parts of the world, certain forms of ransoms are a lot closer to home. We’re talking about ransomware, malware that holds your computer for ransom and demands some amount of money, to be paid to “unlock” it.
Continue Reading… Don’t Let Your PC Get Held For Ransom


Recent Tweets