Before selling or discarding an old computer, or throwing away a CD or DVD, you naturally make sure that you’ve copied all of the files
Read MoreFeatured Articles
What’s the Difference Between Viruses, Trojans, Worms, and Other Malware?
Lifehacker’s tech-savvy readers are the first people on speed-dial when it’s time to heal an infected PC, but how much do you really know about
Read MoreST05-008: How Anonymous Are You?
“You may think that you are anonymous as you browse websites, but pieces of information about you are always left behind. You can reduce the
Read MoreST05-007: Risks of File-Sharing Technology
“File sharing involves using technology that allows internet users to share files that are housed on their individual computers. Peer-to-peer (P2P) applications, such as those
Read MoreMicrosoft issues emergency patch for 10 IE holes
This is just a friendly reminder for users of Internet Explorer to stay up to date with updates offered by Microsoft. This will help ensure
Read MoreHow Passwords are Hacked
It goes without saying that all the latest and greatest security means next to nothing if your password is easily hacked. Life hacker has an
Read MoreCybercrooks step up targeted attacks by 50%
NEW YORK (3/9/10)–Cybercrooks or eCrime syndicates are expanding the base of the brands they exploit for online fraud far beyond major financial institutions and online
Read MoreST05-003: Securing Wireless Networks
Securing Wireless Networks Wireless networks are becoming increasingly popular, but they introduce additional security risks. If you have a wireless network, make sure to take
Read MoreKneber Botnet Highlights Trend of Social Networking Data Being Used by Hackers
“Researchers at NetWitness uncovered a 75,000-strong botnet that infected companies around the world. Among its targets – login credentials for Facebook, Yahoo and other sites.
Read MoreFTC Cracks Down on Con Artists Who Target Jobless Americans
The FTC posted a new release about a new scam threatening people seeking employment… “It’s hard to believe someone would steal money from a person
Read MoreIDENTITY FRAUD AND ECONOMIC HEALTH: AN INVERSE CORRELATION
For several consecutive years following the FTC’s original finding on “America’s fastest growing white collar crime†Javelin Strategy & Research reported that unauthorized transactions committed in another
Read More2010 Identity Fraud Survey Report:
Identity Fraud Continues to Rise – New Accounts Fraud Drives Increase; Consumer Costs at an Allâ€Time Low ID Fraud continued to rise in 2009, with
Read More