The UPS Store recently announced that 51 of their US based stores, in 24 states, were victim to a malware intrusion on their store systems. According to the company, customers who used a credit or debit card at these 51 locations between January 20, 2014 and August 11, 2014 may have had their information compromised. […]
“Facebook viruses”, as they are commonly known, have become extremely prevalent these days. Symptoms include posts you did not write, sending of messages with spammy links to your friends, creating events, and much more. Why does this happen, and what can you do about it? Most people seem to call this a facebook virus. However, […]
Using my Google Apps mailservers on a shared hosting server was causing SPF authentication issues – I was getting a “Received-SPF: neutral (google.com: xxx.xxx.xxx.xxx) is neither permitted nor denied”. This was causing our emails to end up in the users’ spam folders. Even after following all kinds of tutorials both from Google and elsewhere on setting up […]
If you have ever encountered a fake antivirus software, you may know how difficult they are to remove and how harmful they can be. What exactly is a fake antivirus, and what can it do? Read on to find out.
Having a strong password is of utmost importance for keeping your confidential information private and safe. There are a variety of things that can be followed in order to come up with a secure password. Some of these tricks include using long and special passphrases, numbers, punctuation, and a mix of lowercase and uppercase letters. […]
Online shopping is one of the conveniences provided by the internet. With a few clicks, one can compare numerous items and then purchase them instantly. However, the Internet creates several opening for attackers and puts financial and other personal information at risk.
USB drives are extremely convenient to store large amounts of information – they’re portable and easy to carry around, which then make USB drives a prime candidate for attackers to use. Many attackers will infect a computer with malware, which detects when a USB device is plugged in. It will then infect the USB device, […]