Tuesday, February 19, 2019
social network

Staying Safe on Social Networks

“We are what we pretend to be, so we must be careful about what we pretend to be.” (Mother Night; Kurt Vonnegut; Fawcett; 1961) It's even easier to be sociable on social media...
mischa

Mischa Ransomware – Petya’s Best Friend

Overview of Petya ransomware In March, we covered the emergence of Petya trojan-ransomware; an original and dangerous threat. It was very virulent malware as it did not merely encrypt user files and...

How to Remove Alpha Shoppers (Chrome/Edge/Firefox) | Updated

I wrote this article to help you remove Alpha Shoppers. This Alpha Shoppers removal guide works for Chrome, Firefox and Internet Explorer. Given the fact that you are reading this article, we...
backup

Backup Your Data Before Ransomware Strikes

Many users aren't in the habit of making an external backup and instead rely on the system's restore capability if something goes awry and data is lost. If the relevant system...
iot

Ransomware Welcomes the Internet of Everything

With everything becoming increasingly connected electronically, the IoT (the 'Internet of Things') provides a perfect breeding ground for ransomware. In 1999 technology expert Kevin Ashton conceived a vision like some device from...
tips

9 Tips to Computer Security

With growing dependency on e-commerce, virtually any transaction can be made from literally anywhere. From the quick purchase and delivery of a much sought-after book from a buyer on the other...

How to Prevent Ransomware: 21 Tips and Tricks

Nowadays ransomware prevention is very important thing to know. Having in mind that submitting the ransom might be the only option for recovering data, users should learn some tricks to keep...
email protection

3 Ways To Protect Your E-mail Address From Spammers

Now, spam is not just a pain in the proverbial processor – it's a real live and kicking threat. Apart from having to constantly clean up the garbage, one careless click...
webcam

Why You Should Disable Your Webcam

This subject was once considered paranoia, though events have proven that it is possible to spy on a user by hijacking a webcam. Of course, if there is hardware attached to...
backup vs sync

File Synchronization Vs. File Backup

File Synchronization File-syncing is used in operating systems to perform effective backups. It is also used on dedicated platforms for file-sharing (such as Synchronize It!). Updated files are copied either in one...