Can I Guess Your Password?

We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access?... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information, freely available, the Internet has the ability to make you smarter, faster, than any other medium on the planet. Of course with an equal amount of mis-information, it also has the ability to make you dumber, faster, than any other... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can help to prevent you from becoming infected with a Virus or Trojan. It is extremely important to make sure this program is updated at least once a week, and all drives are scanned. Viruses usually are used to destroy your... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. Does she give it back, or does she explore... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually called. These are scouts that monitor your web activities. The work undercover to check on your surfing patterns, spending habits, items bought, they extract email addresses, hijack browsers, steal credit card information. These are just some of the things a... Read More

How to Manage Your Username and Password The Easy and Secure Way

Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. I'm now even more paranoid after I joined YMMSS because I use online payment systems on weekly basis if not daily.I used to use Microsoft Excel to manage my... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. Okay, so here I was, opening Google, entering the name of the eBook - clicking... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it must be your worst nightmare--to wake up and learn that you are a bankrupt. Some crook stole your personal data and all the money you have been sweating blood for years has flown to somebody else's account. Almost everybody must... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer. Mine was getting old, had lost its whistle, and the few remaining bells didn't ding a nicely as they had in the past. Yep, it was time for a new state-of-the art dream machine with CD burner. DVD player, a... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs and objectives of upper management and work to prevent and reduce loss from crime, fire accidents etc.With the continuing threats brought to us by our AL Quaeda and Taliban enemies and the outbreak of new TV shows that reinforce the... Read More

In The News:


Hackers can access personal security systems, post video online
WISN Milwaukee
Holden said hackers are accessing your personal security systems online and posting them on websites like insecam for the world to see. “Surprisingly, this is very low-tech, meaning this does not require hackers actually using their hacking skills ...

and more »

13newsnow.com

Security guard shot outside club in Virginia Beach
13newsnow.com
VIRGINIA BEACH -- A security guard was shot outside a Virginia Beach nightclub early Friday, police say. It happened around 2:15 a.m., just as Aqua Lounge was closing. The Website says the cigar bar and hookah lounge at 5476 Virginia Beach Blvd. closes ...
Police searching for man after security guard shot at Aqua LoungeDaily Press
Security guard shot in Virginia BeachWAVY-TV

all 5 news articles »

CNN

The home security device that's always listening
CNN
(CNN) -- For Airbnb hosts who want to keep tabs on their homes, a full home security system might be overkill. They're expensive, and live cameras and motion detectors invade guests' privacy. So how do they make sure guests keep the volume down, aren't ...

and more »

Riot wants to pay for your League of Legends security hacks and exploits
Polygon
League of Legends is arguably the most popular game in the world, but Riot lacked a quick and easy way for individuals to share weaknesses in the game's security. One security researcher found a vulnerability, emailed Riot and then a week later the ...

and more »

War on the Rocks

CSM: Why We're Launching a Site on Security and Privacy in the Digital Age
War on the Rocks
The Christian Science Monitor is launching Passcode, a section covering online security and privacy, to explore the toughest questions and most pressing issues of the digital age. The rapid advance of the Internet and computing power has brought about ...


Krebs on Security

Convicted ID Thief, Tax Fraudster Now Fugitive
Krebs on Security
In April 2014, this blog featured a story about Lance Ealy, an Ohio man arrested last year for buying Social Security numbers and banking information from an underground identity theft service that relied in part on data obtained through a company ...


New York Daily News

SEE IT: Robot security guard patrols in Silicon Valley
New York Daily News
The rise of the robot security guard has begun. Crime-fighting robots which can spot suspicious behavior and alert handlers at a control center are reportedly about to be deployed across Silicon Valley. The imposing 300-pound RoboCop-style machines, ...
Microsoft Tried Out Robot Security Guards on Its Silicon Valley CampusSlate Magazine (blog)
Microsoft turns to robotic security guards to watch for troublePCWorld
Here Are Microsoft's New Robot Security GuardsBusiness Insider
POPSUGAR -Top Tech News
all 47 news articles »

Security breach reveals personal data on Prince George's school employees
Washington Post
Davis said a report that contained employees' social security numbers, birth dates and employee identification numbers was emailed outside of the school system. A spokeswoman for the system said the outside addresses to which the material was sent were ...


Security system considered for Maple Manor facilities
Standard Speaker
A proposed security system would admit students to locker rooms from playing fields and prevent older students from entering locker rooms in use by younger students, but add $18,734 to the cost of renovating the former Bishop Hafey High School into ...


ABC News

To Win the Social Security Game, You Must Know the Rules
ABC News
Many people may think Social Security is different from other assets, but that's precisely how they should think about it: like any other asset. Of course, the key difference with investing in other assets, like stocks and bonds, is that those are a ...
Social Security Q&A: Can I Stop Widow's Benefits and Restart Them Later?Forbes
Byron Moore: Options, consequences of Social SecurityMonroe News Star

all 11 news articles »
Google News
Showing 1 - 10 of 237 Articles
« Previous
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Next »

Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes,... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

Eliminate Adware and Spyware

Everyone should eliminate spyware and adware from your hard drive... Read More

Temporary Internet Files - the Good, the Bad, and the Ugly

A little bit of time invested into learning about internet... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ---------------------------------------... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

The One Critical Piece Of Free Software Thats Been Overlooked

Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More