You’re going on vacation, but that doesn’t mean you won’t be obsessively checking your email and surfing the web. Which means that somewhere buried in your luggage is your laptop. Heck, it will probably be the first thing you unpack. But, have you thought about protecting your privacy while you’re there out soaking up the sun? Maybe not. Your privacy is always under attack, but even more so when you travel. There’s two things you’ll want to do to protect your privacy while on vacation. First, you want to keep […]
By Steve Horton |
|
|
Let’s face it: your parents don’t look after their PC as well as you do. While home on summer break, now is the perfect time to fix that.
By Steve Horton |
|
|
Clandestine Fox is the name of the exploit, and hackers are taking avantage of people running IE. Here’s how to avoid this hack.
By Mark Beare |
|
|
Heartbleed has made big headlines this week. Learn what it means for you and how to protect yourself.
By Steve Horton |
|
|
Here are seven tips when accessing Wi-Fi in a public environment. You’ll be safer armed with this knowledge.
By Steve Horton |
|
|
It’s important for everyone on a Mac made in the last several years to update to OS X Mavericks 10.9.2 — we’ll tell you why.
By Mark Beare |
|
|
Microsoft has extended security support for Windows XP until July 14 2015. Find out what this means for you.
By Steve Horton |
|
|
User Account Control in Windows Vista & 7 allows you to adjust security levels for each user, allowing or disallowing access to many Windows functions.
By Steve Horton |
|
|
It’s important to know how to raise or lower User Account Control settings for each user you manage, so that Windows notifies you in case your PC is being modified.
By Steve Horton |
|
|
Users of Internet Explorer versions 6 through 9 are at risk of a security breach. Find out more about the problem and how to fix it.
By Mark Beare |
|
|
Here’s some valuable insight into the importance of keeping the software running on your PC up to date!
By Mark Beare |
|
|
What is phishing? No, it’s not a typo, and it’s not a word to describe jamming out on your guitar for hours. Phishing is a type of deception used by criminals to fraudulently gain information, most often in the form of passwords or login information. Phishing can also lead to malicious programs infecting your computer. Phishing attacks typically come in the form of messages or links that are presented to be something that they are not. These can be anything from a malicious link sent to you via email, to a dummy website that mimics a legitimate site to trick you into keying in your login details.