Risks of unrestricted access to Internet
Freedom is something many take for granted, especially when it comes to the Internet. We tend to think that countries…
Sick of spam? So are we. But what is it?
Who likes Spam? There’s Spam and eggs (a classic), Spam and bacon and eggs, eggs bacon and Spam, or even…
Ever wondered what mobile encryption is?
Have you ever wondered what mobile encryption is? Security is a hot button issue, with nearly every company focusing on…
Admin access to systems could be trouble
Security of technical systems and devices used in the office environment is an issue that is important to many companies….
Do you have a social media policy?
When it comes to security most businesses take adequate steps to ensure their networks and systems are secure from the…
Watch out for tech support phone scams
Microsoft Windows Technician Scam For users of Windows systems the threat of a security breach is an ever-present one that…
Security flaws force many to cut Java
For as long as computers have been able to connect to the Internet, there have been security flaws and the…
17 million UPnP devices at risk
There are 17 million UPnP devices at risk As technology continues its creep into every aspect of our life, the…
Twitter sees security breach
Twitter has their First Major Security Breach For many, social media is a deeply ingrained part of daily life. For…
Hunt for your devices with Prey
Prey App Allows You to Find Your Devices Imagine you are in the airport waiting for a flight when you…
Site tracks changes to Terms of Service
Who Owns my Data? One of the more popular debates about the Internet is who exactly owns your data and…
5 common virus myths dispelled
These complex machines helped usher in the information age It can be argued what the most important invention of the…