A Personal Experience with Identity Theft

Some months ago, before there was much publicity regarding phishing and identity theft, I became a victim.My first inkling that I'd been scammed came from a telephone call from my bank asking if I had been to Italy or Roumania. Of course I had not. I was informed by the... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing CPA that it was time to put down my pencil and explore a new venture on the exciting new internet which, while perhaps not exactly in its infancy at that point, was still at least a pimply faced teenaged medium... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type of software which is installed onto your computer without your permission... It can log your keystrokes, which websites you visit, read you email, and even prowl your hard drives. At some point in time, it transmits its harvested information to... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data in that form, STOP! Wait. Don't enter anything yet. If you do, you may be giving away personal information to strangers, and you know what your mom said about talking to strangers.Okay, back up a minute. You want to buy... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive, more complicated.It's created a whole ecosystem, so to speak.A person sits somewhere, writing a new virus, a new application of Spyware. It is put onto the Internet and Anti-Virus and Anti-Spyware vendors begin to develop definitions to combat it, maybe... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out there. The newest addition to the evil software family is the so called Spywares and a good anti-virus program or firewall is not enough to safeguard against these clever programs.Spywares are known by many names such as adware, trojans, malware,... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts in society today. Criminals will use your personal information such as banking accounts and passwords, to pretend that they are you. They may take out credit cards in your name, mortgages, or even worse. The internet has opened up a... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both software publishers and eBook authors getting hosed on a regular basis. You and I, my friend, are victims of software piracy that accounted for over $24 BILLION dollars in lost revenue over the last two years*. There are so many... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with spyware programs running in the background without your knowledge. Spyware, adware, malware and even spamware can cause your computer to behave very strange.If you are experiencing any of these spyware symptoms listed below, chances are you have spyware or other... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal will send you an email which appears to be from a well known company, bank or government agency. The email will direct you to click on a link which directs you to a Website or pop-up box that looks like... Read More

In The News:

Showing 1 - 10 of 237 Articles
« Previous
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Next »

pen paper and inkwell


cat break through


A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

What is Spyware?

The most frustrating part of having Spyware on your computer... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

Online Shoppers, Beware of a New Scam

Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

The Risk Of Electronic Fraud & Identity Theft

Electronic Fraud and Identity Theft Human beings are pretty... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

Crack The Code - Thats A Direct Challenge

I Challenge You To Crack The Code ------------------------------------- I had... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More

What Can Be Done About Spyware And Adware

Having a good Spyware eliminator on your computer is vital... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

Dont Get Hacked - A Guide to Protecting Your Business from Thieves

You've seen it in the news - 40 million credit... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ... Read More

Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole... Read More

Social Engineering - The Real E-Terrorism?

One evening, during the graveyard shift, an AOL technical support... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through The year is 300A.D.,... Read More