The Federal Reserve is providing a guide to understanding the value and content of your credit report. Your credit report is being utilized in a
Read MoreFeatured Articles
ST05-018: Understanding Voice over Internet Protocol (VoIP)
With the introduction of VoIP, you can use the internet to make telephone calls instead of relying on a separate telephone line. However, the technology
Read MoreNCUA unveils Times Square deposit insurance ad
ALEXANDRIA, Va. (11/16/10)–The National Credit Union Administration (NCUA) on Monday continued its “Keep Your Money NCUA-safe” public awareness campaign by unveiling a 520 square-foot ad
Read MoreOwning Our Online Security Expectations
“In the physical world, basic safety measures are second-nature to almost everyone (look both ways, stop drop and roll!). In the digital world, however, many
Read MoreCommon Sense Internet Security Tips from Phineas and Ferb
Now is a great time to begin teaching your children about how protect their privacy online. Disney’s Phineas and Ferb characters offer some video tips
Read MoreProtect Your ID Week set for Oct. 17-23
The Council of Better Business Bureaus and the National Foundation for Credit Counseling are encouraging consumers and small-business owners nationwide to fight identity theft by
Read MoreST05-013: Guidelines for Publishing Information Online
“Unfortunately, many people have become so familiar and comfortable with the internet that they may adopt practices that make them vulnerable. For example, although people
Read MoreST05-011: Effectively Erasing Files
Before selling or discarding an old computer, or throwing away a CD or DVD, you naturally make sure that you’ve copied all of the files
Read MoreWhat’s the Difference Between Viruses, Trojans, Worms, and Other Malware?
Lifehacker’s tech-savvy readers are the first people on speed-dial when it’s time to heal an infected PC, but how much do you really know about
Read MoreST05-008: How Anonymous Are You?
“You may think that you are anonymous as you browse websites, but pieces of information about you are always left behind. You can reduce the
Read MoreST05-007: Risks of File-Sharing Technology
“File sharing involves using technology that allows internet users to share files that are housed on their individual computers. Peer-to-peer (P2P) applications, such as those
Read MoreMicrosoft issues emergency patch for 10 IE holes
This is just a friendly reminder for users of Internet Explorer to stay up to date with updates offered by Microsoft. This will help ensure
Read More