This post was provided by Samantha Strauss on behalf of Drexel University Online. She has written freelance tech articles for a number of educational institutions, including Drexel University. A self-taught programmer, she has spent over a decade working in the tech industry.
Though it’s been plaguing us for quite a while, SQL injection is still one of the most common forms of web site security breaches, as evidenced by recent hacking attacks on such web giants as Sony, Yahoo and LinkedIn, among others. SQL, which stands for Structured Query Language, is just what it sounds like: a language–almost, in fact, THE language that databases use to store, manage, and retrieve information. Continue reading
Scareware, aka fake antivirus, as you may know, is a form of malware usually obtained from a malicious Internet website, that displays ominous warning messages on your PC that states you have been infected with malware. It usually runs a fake malware scan and warns that it has found a very dangerous malware that it will remove for a price. In many cases, the computer is locked up during this process and Continue reading
Here’s a great article I found on the Kaspersky Lab Security site. This is good stuff you should be doing to remain safe as you and your computer use the Internet.
With online banking and shopping offering greater convenience, more and more people are using the Internet to conduct financial transactions and make purchases. However, cybercriminals are capitalizing on opportunities to steal consumers’ passwords, identities, and money. Continue reading
A Net-Security.org article states that Android malware continues to rise. F-Secure Labs reports that a new method of distribution of malware to Google Android smartphones has surfaced in the first quarter of 2013—email spam. There appears to be movement from app-based malware to email spam as the method of infecting Android phones. Continue reading
A recent BusinessInsider.com article announced that the Facebook app for Android Smartphones can change your audio settings, record audio, and take pictures and videos at any time and without your confirmation. Sounds like fun, huh? Especially since there is already malware that can take control of Android phones, Continue reading
The US Department of Defense announced recently that it has approved the use of Samsung phones running a “hardened” version of Android. Android!! The smartphone operating system that has been the target of hackers since it’s inception! The same one that has been plagued with malware-laden applications from Google Play App Store! Continue reading
Strong computer and Internet passwords are important to avoid having your logon credentials stolen by cyber criminals. One way to create strong passwords is to use passphrases; the use of multiple words or even a whole sentence as your password. And actually, the longer the password, the stronger it is. Continue reading