375 posts
6 tips to avoid Valentine’s Day cyber scams
Valentine’s Day is just around the corner and we all know what that means: red roses, heart-shaped boxes… and viruses. Unfortunately, special events and holidays…
How does social engineering work?
Social engineering is a technique used by criminals and cyber-crooks to trick users into revealing confidential information. The data obtained is then used to gain…
Alert! New Whatsapp hoaxes detected
Whatsapp, the popular mobile messaging app is quickly becoming a new means of transmission of phishing attacks, hoaxes and scams. Have you received a message…
How to back up your data
Old photos from years ago, important documents, essays from your college days… Your computer may contain thousands of documents and files. However, few…
How Can We Protect Ourselves from Trojans?
There have been a few times we’ve talked about Trojans on this blog, but … Do you know what they are, and how you can…
7 Tips for Buying Online Safely
The holidays are just around the corner, and with them come traditional headaches on what to buy for friends and family. Shops filled with endless…
Predictions for 2014
2014 is less than one month away, what better time to ask ourselves about the top security trends to watch for in the coming year.…