This guest article is written by Ken Myers, the founder of http://www.longhornleads.com/.
Unlike many adults prior to the Generation X movement of technology, children are subjected to computers and electronics at an earlier age than we were. While many of us grew up with Commodore 64s, Nintendo, and Atari, our children are bee-bopping around the Internet as early as kindergarten. There wasn’t a single computer in the elementary school I attended. With this ever persistent technology, how do we keep our kids safe while they browse the Internet? Continue reading
Sensitive information on 79,000 major U.S. dams has been compromised by a breach by Chinese hackers. The database contains information on vulnerabilities of every major dam throughout the U.S. You may be thinking; so what, dams are pretty non-exciting huge chunks of concrete and rock. Why would the Chinese, or anyone else, want this information? Continue reading
“We all want the best for our children, including the ability to leverage technology. However, with technology come risks, risks that our children are often not aware of or prepared to deal with. As parents, it is our responsibility to ensure our children understand these risks and how to protect themselves. But Continue reading
Each Internet computer user has the power to improve his or her security for free, in less than 5 minutes and without downloading anything.
Much of our vulnerability to malware and identity theft begins with the choices we make when using our computers to travel the Internet and even managing our email. We make choices when we visit websites, when we backup our computers, when we open our email, and when we click on links. Choices that Continue reading
Botnets “can allegedly generate more than $6 million a month through bogus clicks on online adverts.” Cybercriminals are very smart in their use, and cross use, of the tools they have to commit money-making crime. Continue reading
According to a recent Help Net Security.org article, cybercriminals are using phishing Internet websites to trick mobile device users to enter their banking credentials for them to steal. Mobile devices include smartphones, tablets, PDAs, or any small, handheld computing device that can access the Internet, even notebook computers can be considered mobile. Continue reading