Your router is your first line of defense against malicious attacks from the internet. But do you have a secure router? I’ll review the important settings.
It’s possible to send email to someone without having their email address show up on the To: or Cc: lines by using blind carbon copy or Bcc.
A stolen or lost computer can open the doors to all sorts of havoc if you’re not prepared. I’ll cover a few of the basics.
Buying a new machine is a common knee-jerk reaction to a bad malware infestation. And it’s wrong. Not just a little wrong — it’s very wrong and unnecessary.
Even with up-to-date anti-malware tools, you can still fall victim to malware. I’ll explain why by comparing your computer to your … bathroom.
Several urban legends would have you believe that when you forward an email, it can somehow be tracked. It cannot. Period. I’ll explain why that is.
Email account theft is rampant. If it happens to you, there are several steps you need to take, not only to recover your account, but to prevent it from being easily hacked again.
As security compromises happen at a regular pace, many are asking, “Is the cloud too dangerous?” It’s as safe as you make it.
‘The Cloud’ is the latest buzzword for internet-based services. Before diving in, it’s important to understand a few things about cloud security.
Using different passwords on different sites is not only good practice — it’s actually necessary to keep your accounts safe. I’ll review why, and how best to handle a plethora of passwords.