In an effort to show how well it is already doing to fend off daily attacks from an infinite swarm of hackers, Microsoft now wants its users to know that has a brand new way of protecting them. Unlike the previous updates which fixed and patched security vulnerabilities in the software of the system, this new method of security protects against the human aspect of computer security, or in other words, finally helps fight the human exploits that usually gets most users in trouble.

Read More →

The recent surge of distributed denial of service (DDoS) cyber attacks on corporate websites makes it appear like there’s a new cyber attack every day and that there is nothing that can be done to prevent them. However, the truth is that these “cyber attacks” are not as unavoidable as most people think, and can easily be prevented with the right know-how.

Read More →

With the news of Osama Bin Laden’s demise, everyone has been searching the Internet for information on what really happened, seeking photos of the notorious terrorist’s body. Beware, however – whenever there’s a hot topic or something that a large mass of people are searching the web for, cyber criminals are always right around the corner with viruses and spyware.

Read More →

It is always best policy to secure your wireless network, but whenever you scan for a Wi-Fi connection in a public place you usually find at least one open network. So why do people choose to leave their networks unsecured? Likely, they’re thinking that, “It won’t bother me if someone uses my connection,” or they’re just too lazy to set it up, seeing unsecured connections as harmless, or even benevolent to others.

Read More →

Have you ever noticed that when you log into your web account on a different computer that you still get the same advertisements? That’s no coincidence. What’s really happening is that advertisers are tracking the activity of all the web identities you use, and then link that browsing history to wherever you log in with those accounts; basically tracking your actions on whatever computer you use.

Read More →

Gawker readers are technologically savvy, as the popular blog and its’ many Web sites deal primarily with innovation and the Internet. But the recent security breach has shown that  even though the users are aware that they should be keeping secure passwords, most users still use very easy-to-guess log-in information.

Read More →

A new type of malware has recently been discovered that not only gains access to your files, but also take access away from you. Known as “ransomware,” this virus works by taking control and encrypting your files with a 1024-bit encryption, a level of encryption that is nearly impossible to open unless you have the right key. And the only way to get this key is to pay the hackers a ransom.

Read More →