Q: I recently received an email that supposedly came from eBay that said someone had attempted to log into my eBay business account without authorization (whatever that means). The email instructed me to click a link to re-enter and confirm my account information to make sure that my account had not been hacked. Being naturally paranoid I contacted eBay directly…
Category: Security
Protecting Your Self Against Online Credit Card Fraud
Today more and more people are looking to the internet to do their shopping. With online stores popping up all over the internet the urge to spend money on the World Wide Web has never been stronger. The unfortunate thing is that the urge for scam artists to take your money has never been stronger. So how do you protect…
The Benefits Of Internet Security On The Education Front
Online Courses Bring Advantages and Security Threats A college education is mandatory in today’s job market. Because of this, many workers find themselves pursuing a higher education while they are employed. One way colleges are making access to education more convenient for workers is by offering a wide range of their curriculum via online courses. This growing trend brings with…
Protect Your Privacy
The internet is evolving rapidly as its uses grow in number and variety. More and more users are shopping online, chatting with their friends, or just browsing the web for something interesting. But the net isn’t an entirely safe place; some people out there are waiting to take advantage of you and invade your privacy. There are some special kinds…
The Home Computer User S Guide To Spyware
As with the computer virus, spyware can be broken down into a number of different categories. Most users are familiar with the term “adware” which refers to software which serves annoying ads. There are however a number of other spyware variants you should be aware of. To begin with it is important to have a clear definition of spyware. This…
Record Two Way Conversations With Digital Voice Recorders
There are various types of digital voice recorders available for recording both two-way telephone conversations and personal on-site conversations. Both can be done covertly if that is what the situation calls for. One way to handle the telephone data recording is with a simple PC phone recorder, you can plug your phone jack into it and by using your PC…
Sending Passwords By Email
It amazes me how many sites allow you to register, and then send you an e-mail to your registered address containing your password in plain-text. There is never a warning stating that the site will email the password you use, for all to see. Sending passwords by e-mail works when you forget a password. The site changes it and e-mails…
Ten Steps To Reduce Your Risk Of Identity Theft
You’ve probably heard about identity theft on television or read about it in the newspaper, and you may already be aware of the damage these crimes can cause victims and their families. What you may not know is how to protect yourself from these attacks. Below you’ll find ten steps that can help you minimize your chances of becoming another…
Did I Hear You Say Mama Help Me I Lost My Websites
This simple reminder is dedicated to all Webmasters (and Webslaves like me). Don’t sleep tonight without reading this. Find out why below… Have you seen people cried out loud for help because they lost their websites? I have seen this many times in several forums and have personally experienced the same not long ago. I am a living testimony on…
Phishing And Pharming Dangerous Scams
As soon as almost all computer users already got used to — or at least heard about — the word “phishing”, another somewhat confusing word appeared. Pharming. Does it differ from phishing — if yes, how? Two Pharmings Actually, two completely different fields use the term “pharming” now. We can say there exist two separate “pharmings”. If genetics or businessmen…