8 Signs Your Computer Might Be Infected with Malware
Anti-malware software plays an important role in the battle against cybercrime. However, it is not infallible. Cybercriminals are constantly releasing new malware programs or variants of existing ones, and it takes a while for anti-malware software companies to update...
How to Keep Your Files Safe from CryptoJoker
A new form of ransomware called CryptoJoker was discovered in January 2016. It uses the AES-256 algorithm to encrypt victims' files and then demands a ransom for their release. CryptoJoker affects computers running Microsoft Windows operating systems. Although...
How to Avoid Falling Victim to Macro-Based Malware Attacks
Macro-based malware attacks are as tenacious as dandelions. Just when you think they are gone for good, they keep popping up. These days, they are popping up in the form of bogus shipping notices, supposedly from the United Parcel Service (UPS) or United States Postal...
How Cookies Are Being Used to Track and Attack You
When most people talk about cookies, the conversation is usually about sweet baked goods. But when IT professionals talk about cookies, we are discussing the Internet. In this context, the term cookies refers to small data files that contain strings of text. When you...
Avoid Tech Support Phone Scams
Cybercriminals don't just send fraudulent email messages and set up fake websites. They might also call you on the telephone and claim to be from Microsoft. They might offer to help solve your computer problems or sell you a software license. Once they have access to...
Is Using Fingerprint Authentication a Good Idea?
With fingerprint authentication, you do not need to remember and enter a password to access a device. You just place your finger on a fingerprint scanner. If your fingerprint matches the scanned image on file, you gain access.More and more devices are using...
How to Spot Phishing Attacks
One of the main tools in a hacker's toolbox is the phishing attack. Hackers use these large-scale attacks to steal personal information from as many people as possible.Hackers using phishing are digital con artists. With hidden malware and a convincing pretense, they...
Microsoft Releases Emergency Out-of-Band Patch for Internet Explorer
Microsoft issued a critical advisory about a zero-day vulnerability on Tuesday that affects all versions of Windows. If Microsoft calls a vulnerability "critical" and releases a patch outside of its normal Patch Tuesday monthly schedule, you should take note....
Defending Against Cybersecurity Threats in Your Hotel Room
Being on the road is typically a stressful affair. Travelers have to worry about making their flight connections or booking reservations to a hotel or restaurant. Just being in an unfamiliar area can make some people anxious. Unfortunately, when sorting out these...
What is Domain Privacy Protection?
What is it?Domain privacy or WHOIS protection (different registrars sometimes refer to it by different names) hides the domain registrant’s personal information from the public WHOIS database.WHOIS is an organization that manages all data regarding domain...