The city of Columbus, Ohio notified 500,000 residents of a data breach that compromised SSNs and ban
By Paul Bischoff
in News
on November 4, 2024
Scholarship scams take advantage of students looking to help fund their education. We reveal how to spot and avoid common scholarship scams, as well as what to do if you've been caught out by one.
By Aimee O'Driscoll
in Information Security
on December 21, 2023
In this article, we’ll explore the best USB port locking tools you can use to secure your ports without sacrificing productivity.
By John Cirelly
in Net Admin
on December 16, 2024
Think Linux can't get viruses? Think again! Learn how to detect and eliminate malware on your Linux system with our expert guide. Keep your data safe and your system running smoothly.
By Craig McCart
in Antivirus
on November 3, 2024
Having an antivirus program running on your computer is a sound practice. But what happens if you install a fake antivirus program? And how would you know? We explain how to avoid fake antivirus and mitigate the threat to your computer.
By Marc Dahan
in Antivirus
on October 22, 2020
You can capture packets without buying any special equipment because your switch can forward copies of passing traffic. This process is called port mirroring. Find out what it is and how to implement it.
By Stephen Cooper
in Net Admin
on March 20, 2023
Can banks refund scammed money? Learn your rights, time limits for reporting fraud, and crucial differences between credit and debit card protection. Get your money back.
By Craig McCart
in VPN & Privacy
on November 5, 2024
Fake emails phishing for your personal data can look surprisingly like the real thing. Here's how to
By Gillian Jones
in Information Security
on March 18, 2017
Account takeover fraud can be damaging for businesses and individuals alike. We explain more about this common crime and how to detect and prevent it.
By Aimee O'Driscoll
in Information Security
on January 18, 2021
Whaling is a devastating type of phishing attack, and unfortunately, it's becoming more common. Read on to learn everything you need to know about whaling and how to protect your business.
By Stephen Cooper
in Information Security
on August 25, 2023