Taxing Times: Dealing with tax identity fraud in America
Filing your taxes on April 15? What if someone has already filed “your” income tax return? Sadly, this can happen, and it does happen, all too often. Here’s why, and what you can do about it.
Browsing category
Filing your taxes on April 15? What if someone has already filed “your” income tax return? Sadly, this can happen, and it does happen, all too often. Here’s why, and what you can do about it.
Pamela [Win] It is free to download and allows you to record calls you make using Skype. It works on Windows devices and according to the website its certified by Skype. Here is a list all the features that it has: Skype Call Recording Skype Video Recording Skype Chat Recording Skype Call Transfer Skype Call […]
Lost you android phone ..? Feeling to sad .. ? Dont worry Now we came with another Application which sorts out your problem in simple way. Recently Google had come up with an Application called Android Device Manager. What is Android Device Manager? This App is developed by Google for their Android Devices, this App […]
Common ports, such as TCP port 80 (HTTP), may be locked down — but other ports may get overlooked and be vulnerable to hackers. In your security tests, be sure to check these commonly hacked TCP and UDP ports: TCP port 21 – FTP (File Transfer Protocol) TCP port 22 – SSH (Secure Shell) TCP […]
We all know that sinking feeling when your computer decides to slow down and barely function for no real reason. Why is my computer so slow? There are several reasons why your computer might not be running at it’s optimal speed. Let’s start with what you’ve got running in the background..have a quick look, how […]
Microsoft will cease providing security updates for the Windows XP operating system on April 8, 2014. If you cannot get away from Windows XP yet, there are still a few things you can do to keep yourself safe.
Apple’s Mavericks update was the first free update to Mac OS X – itself a big step forward for security, as all Mac users can update to the latest version freely (providing their machine is up to the new software – which Apple allows you to check here). But under the bonnet of Mavericks lurk
Apple’s Mac OS X Mavericks has some very neat privacy features built in – from a “Guest User” account which restricts people to using Safari when borrowing your Mac to a panel which prevents apps using your location.
It seems like every few days there is a new story involving teenaged girls being tricked or blackmailed into sending compromising pictures of themselves to their tormenters. For the last few years, the FBI has been warning that this crime – “Sextortion” – is on the rise.
When someone says “data privacy” most people think about the information that is available on sites like Google and Facebook, or stored away in some marketing database. But when it comes to very private information, there are few things most of us would be more horrified to find floating around on the Internet than our medical data.
Phishing is unique among cyber attacks – it doesn’t rely on weaknesses in computer software, or new vulnerabilities – it relies, initially at least, on human gullibility. Our guide offers advice on how to avoid the latest scams – and why tablet and smartphone users need to stay alert.
Over the past two years, many online services have started to offer ‘two-factor authentication’ – an extra security measure which often requires a code from an app, or an SMS message, as well as a password. Our guide explains how, why and when to use ‘2FA’.
‘Adware’, software which delivers unwanted adverts, isn’t as scary as some malware, but ESET’s analysis of Win32/Boaxxe shows that ‘malicious’ adware is becoming increasingly hi-tech and stealthy. Our guide will help you clean your machine – and see fewer unwanted ads.
Read how to protect yourself if you’ve been shopping with credit or debit cards (and who hasn’t?). As the scope of the latest cyber crime spree expands beyond Target and Neiman Marcus, malicious software is suspected.
Target’s 2013 data breach is expanding in scope and scale, requiring additional vigilance on the part of shoppers to protect their accounts and their identity.
ESET’s Threat Trends Predictions report for 2014 found new Android malware increased 63% from 2012 to 2013 – so If you’re a user ‘switching sides’ from an Apple iDevice, you might be alarmed. But a few sensible steps are all it takes to stay safe on Google’s OS…
Tips for shoppers worried that their credit or debit cards may have been compromised by the massive security breach at Target stores.
we provide more detail on the most exploited applications and advise a few steps users can (and should) take to further strengthen their defenses.
Have you checked out the weekly podcast by ESET security researchers? It’s called the ESET Malware Report and it covers many security and privacy topics in handy 5 to 10 minute audio interviews.
For years, “encryption” has sounded like James Bond technology to many PC users – but new systems have made “crypto” technology easier to use, and a great way to protect the files you REALLY value.
Information security policy can make a big difference for small business. Here we offer advice, resources, and a free recorded webinar on the subject to help your small firm beat the bad guys, and the competition.