Security

How to Create a Secure Wireless Router Setup

We live at a time when the “Internet of Things” is starting to gain traction in our life. It seems every new product sold today can easily connect to the Internet through a wireless connection, which is usually a wireless router. Of course, as with most things created, it may seem like a good idea to be able to access your devices remotely, it also means that malicious users may also be able to gain access to your devices.

Continue Reading

5 Tools to Secure Your Windows Computer

Since the days of using DOS, personal computers have always had the risk of being infected with malicious software. Over the years, malware has evolved from basic viruses, to rootkits, and now ransomware that encrypts your data. With each new release of malware, it seems anti-virus software developers are always playing catch-up to make sure their software can protect a computer from the new malicious software.

Continue Reading

Is LastPass Secure?

LastPass is a popular cloud-based password manager that has quickly become popular for those looking for an easy solution to create and keep their passwords safe. There are many software and cloud-based solutions available for managing passwords, such as RoboForm and KeePass, but for many users – myself included – LastPass is what they prefer. Of course, as with any software that stores personal information, the question on how secure LastPass really is has come up in many discussions online.

Continue Reading

How You Can Create Stronger Passwords

It seems that news about a breach of security that results in the stealing of usernames and passwords seems to be an everyday occurrence these days. The news, from Hold Security, that Russian hackers have created a list of 1.2 billion usernames and passwords come as a surprise because of the number of login credentials that have been stolen.

Continue Reading

Why Common Sense is Vital to Computer Security

I read an article about the how Justice Department in Canada launched a mock scam as a security exercise to determine how the employees react to a phishing e-mail. Much like a real phishing e-mail, the mock e-mail was made to look like an official government or financial institution e-mail, with a link to a fake website made to look like a real site.

Continue Reading

Why Protecting Your Computer Should Involve More than Antivirus

Since the days of DOS, we have been told to install an antivirus program on our computers to keep our computers protected from viruses and other malicious software. Over the years, though, malware developers have become more advanced in their development of malware to the point where many antivirus programs are constantly playing catch up, or have failed to find malware installed on a computer.

Continue Reading

What You Need to Do to Secure Your Internet Connection

The Internet is a haven for both viruses and malware that infect millions of computers each year. These types of software are coded to do a specific task, such as steal personal information, restrict access to a computer to extort money, or just make a computer inoperable. There are many bad things that can happen because of malware, and most, if not all malware, originates from the Internet.

Continue Reading

Why Are Hackers Interested in Your Computer?

To you, a computer is something that you may use for going online, checking your e-mail, playing video games or do work. To a hacker, however, your computer is much more. A computer to a hacker is about the processing power, the applications that are installed, and, of course, the data that is stored on the hard drive. All this information combined is like gold to a hacker.

Continue Reading