subscribe: Posts | Comments

Share Your Wi-Fi Without Giving Your ...

“What’s the Wi-Fi password?” If you’re like us, you’ve heard this shouted throughout...

Share Your Wi-Fi Without Giving Your Password
posted on: Nov 14, 2016 | author: lorenn

How To Secure Your Wireless Network

Follow These Seven Easy Steps: WI-FI PROTECTED SETUP – new routers have a WPS button to lock the device during...

How To Secure Your Wireless Network
posted on: Nov 7, 2016 | author: lorenn

Something Your Router Needs Now To Ke...

There’s a gadget in your home that you don’t give much thought to until it stops working and you discover you’re...

Something Your Router Needs Now To Keep Hackers Out
posted on: Nov 2, 2016 | author: lorenn

Lookout For Gmail Hack

I recently had a client who lost their incoming email and all contacts within Gmail by inadvertently opening or...

Lookout For Gmail Hack
posted on: Oct 6, 2016 | author: lorenn

Help Keep Your Facebook Account Secur...

Adding a mobile phone number to your Facebook account helps you reset your password if you ever need to, find friends,...

Help Keep Your Facebook Account Secure
posted on: Sep 29, 2016 | author: lorenn

Hackers Can Steal Your Details In Thr...

Video shows how exposed your personal details are to cyber criminals. Tools so accessible school students can download...

Hackers Can Steal Your Details In Three Easy Steps
posted on: Sep 22, 2016 | author: lorenn

Hackers Can Use Your Webcam To Spy On...

Mark Zuckerberg of Facebook does it. So does FBI Director James Comey. Should you? What they do is cover up their...

Hackers Can Use Your Webcam To Spy On You
posted on: Jul 30, 2016 | author: lorenn

Chip Shield Personal Card Reader

Chip Shield is a unique product that leverages the chip technology already in your wallet to protect you from online...

Chip Shield Personal Card Reader
posted on: Jul 1, 2016 | author: lorenn

Homeland Security Warns Windows PC Us...

Homeland Security warns Windows PC users to uninstall Quicktime The Department of Homeland Security and a top...

Homeland Security Warns Windows PC Users
posted on: Apr 26, 2016 | author: lorenn

Stay Safe on Public Wi-Fi Networks

Public Wi-Fi networks—like those in coffee shops or hotels—are not nearly as safe as you think. Even if they have...

Stay Safe on Public Wi-Fi Networks
posted on: Apr 13, 2016 | author: lorenn

Reclaim Your Privacy in Windows 10

Windows 10 has deep cloud hooks and shares a lot of data with Microsoft in order to create a smart, seamless...

Reclaim Your Privacy in Windows 10
posted on: Jan 29, 2016 | author: lorenn

What Is Badware?

Badware is software that fundamentally disregards a user’s choice about how his or her computer or network...

What Is Badware?
posted on: Jan 23, 2016 | author: lorenn

Update Security

The worst tech-support call you can get starts something like “I think I have some kind of virus?” Prevention is...

Update Security
posted on: Jan 13, 2016 | author: lorenn

Cybersecurity for Electronic Devices

Why does cybersecurity extend beyond computers? Actually, the issue is not that cybersecurity extends beyond...

Cybersecurity for Electronic Devices
posted on: Dec 28, 2015 | author: lorenn

Securing Your Home Network

How are routers used in your home network? Home routers have become an integral part of our global communications...

Securing Your Home Network
posted on: Dec 23, 2015 | author: lorenn

Password As Secure As Poetry?

We all know “password” is no good, and “1234567” is asking for trouble. But the more we try to...

Password As Secure As Poetry?
posted on: Nov 18, 2015 | author: lorenn

Yahoo’s Email App Lets You Skip...

Account Key enables Yahoo’s mobile users to log in to their email accounts while bypassing the password step of...

Yahoo’s Email App Lets You Skip Passwords
posted on: Nov 5, 2015 | author: lorenn

Catch An Internet Thief

Do you have your Wi-Fi protected with encryption and a strong password to keep out casual snoops? Unfortunately, an...

Catch An Internet Thief
posted on: Nov 1, 2015 | author: lorenn

What is Two Factor Authentication?

There are three basic factors that can be used for authentication: Something you know (Maybe a password, secret, or...

What is Two Factor Authentication?
posted on: Sep 15, 2015 | author: lorenn

How to Hack a Car

...

How to Hack a Car
posted on: Jul 14, 2015 | author: lorenn

« Previous Entries Next Entries »