Category: Blog

Anti-Virus

Anti-Virus

 What's an Anti-Virus? A computer virus is a malicious code which is capable of loading itself into one's computer and run against one's wishes. Anti-virus software detects and ...

Brute-Force Attacks

Brute-Force Attacks

What is a brute-force attack? Brute-force attacks are methods used by criminals to determine a password or PIN in order to break into a computer or network. Hackers may use ...

Carding

Carding

What is Carding and how can it affect you? Carding is the act of taking the credit card information from an unsuspecting victim and using it to either make unauthorized ...

Bot

Bot

What is a "bot" Short for robot, a "bot" is a script or application that succeeds at completing repetitive actions on command. Malicious bots allow an attacker to gain ...

Tax Scams Are Up 400% This Year

Tax Scams Are Up 400% This Year

Why are tax scams on the rise? According to the IRS, tax scams are up 400% compared to last year (2015). As of mid-February, the IRS has already had nearly 1,400 incidents. ...

IRS Hacked Again by Identity Thieves?

IRS Hacked Again by Identity Thieves?

Why can't the IRS secure their own site from hackers? In a statement on February 9th, the IRS stated that Identity Thieves breached the IRS database. Roughly 464,000 unique ...

Black Hat Hacker

Black Hat Hacker

What is a black hat hacker? A black hat hacker is a computer expert who finds vulnerabilities in internet security and exploits them for their own malicious gain. These ...

Backdoor

Backdoor

What is a backdoor? Like the term implies, a backdoor in the sense of computer security refers to a hidden method of side-stepping active authentication requirements to gain ...

Bankruptcy

Bankruptcy

Bankruptcy Bankruptcy is the legal status of a person, an entity or a corporation to be unable to pay back the debts it owes to creditors. Although bankruptcy may be ...

Editor's choice Account Takeover

Account Takeover

  Account Takeover: Stay Alert Before you Become a Victim Account takeover occurs when a perpetrator unlawfully obtains and uses a someone's personal information to control ...

Login/Register access is temporary disabled