Many of us have got wiser to email spams and scams – but cybercriminals are in the perfect position to “fine tune” their attacks. Our tips might help you avoid the “click of death”…
Beat the heat, find somewhere cool to compute! But first check our tips on how to more safely navigate the mall, lobby, library, coffee shop or wherever you go to chill out with your digital devices.
Many people leave phones and tablets “open” to criminals – both the cyber variety, and the ordinary, non-cyber kind. Our tips should help your handset safe.
Spotting “bad” apps on Android is not always easy – with cybercriminals finding new tricks every month to fool phone and tablet users into downloading malware.
Summer is here and school is out, what better time to take a look at improving the cyber protection on all of your household’s many digital devices?
Correct identification of an individual using a computer or service is important because it represents the accountability of the person identified. If you know my username on a computer system, you can check on what I do on that system through an audit trail, and I can therefore be held accountable for those actions. However,
As we read earlier this week, the chances that one or more of your digital devices may get stolen are uncomfortably high. So what would happen if your mobile device falls into the wrong hands? Here are a few tips that will help minimize the damage if it happens to you.
Your email account can be used by cyber criminals to spread malware or attempt to steal personal details from you. Follow our tips for a safer email experience. Create and use secure passwords As with all your online activity, you should always choose passwords that are hard to guess and to crack. This means long
Want to be safer online using your laptop or tablet when using public Wi-Fi? You can. Here are our five essential tips. 1 First, if you are not going to use the Internet it’s a good idea to turn off Wi-Fi connectivity completely on your laptop, smartphone or tablet. You are then guaranteed that your
Do you know what your kids get up to online? They probably know more about technology than you do but they are still children and need protecting. Here are our top tips to ensure they remain safer. 1 Educate your children Children and young people spend huge amounts of time online and may not be
Most people now use a wi-fi network to access the internet around the home. However an unsecured network could let your neighbor’s piggyback on your broadband or worse, let hackers snoop on your activities. Luckily it’s not that difficult to harden the security of your home network. Here’s a quick step-by-step. 1 Check the router
Amazingly one seventh of the world’s population is now on Facebook. That’s a lot of people. Sadly, some of those are out to steal your data from your profile if they can. Here’s how to adjust your Facebook settings to help protect your data on Facebook and stay safe. 1 Don’t give too much away… Be
Now that Facebook’s timeline feature is in the final stages of being rolled out to all users (including, finally, to my account), it is important that everyone understands how to use the feature and, most importantly, how to secure your identity and privacy in its new context. Timeline is quite a simple feature, introduced by
Ahead of next week’s VMWorld in San Francisco, here are some thoughts on the safe use of cloud computing for smaller businesses, along with a podcast (see the link at end of the post). The Cloud concept, a flexible Virtual Machine (VM) based system that allows rapid expansion and dedicated functionality without hiring new staff,
Summer is here and for many families that means travels plans, but do your summer travel plans include taking care of your data and digital devices? Which digital devices do you plan to take on your trip and what sort of data do they contain? Perhaps more importantly: What kind of data can they access?
Like Facebook, Twitter wants to know which websites you visit and so it has a system for tracking you as you click from site to site, a fact that leads to a pair of interesting questions: “Did you know that?” and “Are you okay with that?” As we will see in a moment, this system
If the smartphones of ESET bloggers are any indication, scams executed via SMS text, known as smishing or SMS phishing, are on the rise. I don’t do a lot of texting, which makes a smish easy to spot on my phone, but I just read an amazing statistic from a Pew report: Users 18 to