Junk mail is not only annoying, it can be stolen and used for identity theft. We explain how you can
By Paul Bischoff
in Identity Theft Protection
on July 21, 2019
Architecture firm CannonDesign notified 13,049 people of a January 2023 data breach that compromised
By Paul Bischoff
in News
on August 20, 2024
Credential dumping attacks are a type of credential-based attacks and they can be difficult to detect. This post looks at how credential dumping works and what you can do about it.
By Marc Dahan
in Information Security
on September 22, 2023
TotalAV sticking around? Our guide wipes this clingy antivirus program off your PC in minutes. Plus, learn how to ditch leftover files & find top alternatives!
By Craig McCart
in Antivirus
on April 25, 2024
Indiana headhunter Leaders Staffing notified 51,929 people of a data breach that compromised SSNs an
By Paul Bischoff
in News
on October 21, 2024
Botnets flood your web servers and gateways, filling up their queues and blocking legitimate access. Find how to stop them.
By Stephen Cooper
in Data Privacy Management
on February 26, 2024
Need a VPN to use with uTorrent? We reveal the best uTorrent VPNs based on speed, security, and more. We also explain how to bind your IP address so files are only downloaded when your VPN is on.
By Paul Bischoff
in VPN & Privacy
on June 14, 2024
UFO VPN exposed millions of log files about users of its service, including their account passwords and IP addresses, despite claiming that it keeps no logs.
By Paul Bischoff
in VPN & Privacy
on July 21, 2020
Ransomware can shut down your business by encrypting all data files. Find out how to detect and stop ransomware before it causes damage.
By Stephen Cooper
in Net Admin
on December 5, 2024