370 posts
Tips for protecting children on the Internet
Have your kids got a tablet? Or their own computers? A phone with Internet access? The answer is probably ‘yes’. There was a time…
Improve the privacy of your Hotmail account
A few days ago, we discussed the changes to the Gmail privacy policy, and today we want to take a look at another popular webmail…
6 tips to avoid Valentine’s Day cyber scams
Valentine’s Day is just around the corner and we all know what that means: red roses, heart-shaped boxes… and viruses. Unfortunately, special events and holidays…
How does social engineering work?
Social engineering is a technique used by criminals and cyber-crooks to trick users into revealing confidential information. The data obtained is then used to gain…
Alert! New Whatsapp hoaxes detected
Whatsapp, the popular mobile messaging app is quickly becoming a new means of transmission of phishing attacks, hoaxes and scams. Have you received a message…
How to back up your data
Old photos from years ago, important documents, essays from your college days… Your computer may contain thousands of documents and files. However, few…
How Can We Protect Ourselves from Trojans?
There have been a few times we’ve talked about Trojans on this blog, but … Do you know what they are, and how you can…