Category Archives: Blog

Medical Identity Theft

Medical Identity Theft

Medical Identity Theft The next time you go to see your doctor and you’re asked to provide your identity and insurance information, be careful. Why? That person asking for your insurance and proof of identity may be after more than your identification. They might want your identity. Identity thieves work to get your personal information […]

Symantec Buys LifeLock for $2.3 Billion

symnatec buys lifelock

  Symantec which is an American technology company headquartered in Mountain-View, California, is a company that produces software for security, storage, backup and availability while offering professional services to support its software. Well, it seems that the company has taken a major leap in acquisitions as of this week. The company has recently announced that they […]

Malvertising

Malvertising
What is Malvertising? The use of online advertisements to help spread dangerous malware is known as "malvertising," a word derived from "malicious advertising." How malvertising works Malvertising is growing in popularity. It involves putting dangerous codes into online advertisements, which could infect your computer even on trusted websites. Unfortunately, there's a good chance you won't [...]

Cloud Security

Cloud Security
What is cloud security? Cloud security, also known as cloud computing security, is an umbrella term that refers to the policies, controls and other technology used to protect data and other details involved in cloud computing. (Cloud computing is provides shared resources and information to computers, smartphones, tablets and other devices on-demand.) Threats to cloud [...]

Sniffing

sniffing
What is sniffing? Sniffing in the computer-technology sense refers to the act of eavesdropping on network traffic, perhaps between a computer and a website or between two computers. When used for malicious purposes, sniffing can result in private information being stolen. How does it work and what's the risk? Sniffing allows a user to obtain [...]

Computer Zombie

Computer Zombie
What is a computer zombie? A zombie is a computer that is hacked by a cybercriminal and then used, without the victim’s knowledge, to infect other computers and networks with malicious software via the Internet. Usually, hackers create a zombie computer to either carry out malicious acts, to steal money, or steal identities. How are [...]