Articles tagged: security
For years, the standard practice has been to assume that eight-character passwords made up of sufficiently random characters was enough. Not any more. Not even close.
Your router is your first line of defense against malicious attacks from the internet. Is yours secure?
Travel is exciting, but be sure to plan ahead for your technology to avoid things going wrong.
Tracing the privacy and security of the path from your fingertips through the services you use to your information’s final destination.
Regardless of your initial thoughts, every account is important, and we are all targets.
Many people want to be secure, not realizing there’s no such thing.
Online shopping is ubiquitous, and yet some avoid it completely. Why are some people afraid to shop online when it’s arguably safer than offline?
If your computer is not physically secure, someone could install something even if you’re not logged in.
Although there’s no way to remove all traces of yourself from a machine, there certainly are ways to remove as much as you can.
Buying a new machine is a common knee-jerk reaction to a bad malware infestation. And it’s wrong. Not just a little wrong — it’s very wrong and completely unnecessary.
We are all under constant attack. I’ll show you how to look at your Outlook.com recent activity and review why it might be full of failed login attempts.
Anonymity on the internet is really, really hard. Some of the practices we might use to stay anonymous could still be leaking identifiable, traceable information.
Your ISP controls your internet connection, and it’s easy for them to monitor the data you send and receive. The question is, why would anyone monitor your internet?
If I could tell you only one thing about securing your home network, this is at the top of my list.
An up-to-date web browser is important, but it’s not the whole picture, by far.
Five Tips to get the most out of your technology. Tip #4: Stay Safe – I discuss the most important security software you have.
Privacy on the internet means different things to different people. I discuss three different privacy applications out there, explain what exactly each does, and offer some of my own thoughts.