Posts Tagged ‘Security’

Tips to Protect Online Accounts and Information

Tips to Protect Online Accounts and Information

Chances are you’ve had problems with malware or viruses in the past. You may have even had one of your social networking or email accounts compromised at some point. The threat of cybercrime is very real and not as personal of an attack as some may think. It’s often a shot in the dark, with ...

How to Secure Your Mac After a Proctored Online Test

How to Secure Your Mac After a Proctored Online Test

As more college courses become available online, more students will be subjected to proctored online tests. Remote proctors help quell the concerns many in higher education have about students cheating on tests and exams that weigh heavily on grades. If you haven’t been subjected to one yourself, the idea is a high-tech version of your ...

8 Ways To Make A Stronger Password

8 Ways To Make A Stronger Password

People like to think that passwords get hacked because hackers use some massively powerful programs with complicated algorithms to crack them. However, hackers tend to get into people’s accounts simply with educated guesses. Informed ones, sure, but guesses nonetheless. The easiest way to protect your account, then, is to make it difficult to guess. 1. ...

Trusted Contacts on Facebook Hold the Keys to Your Account

Trusted Contacts on Facebook Hold the Keys to Your Account

A new Facebook feature is putting your account’s security in the hands of your most trusted friends. Working as a password recovery tool, Trusted Contacts allows you to set up additional security for situations where you find yourself locked out of your account. It started off as a test feature in 2011, but is now ...

CISPA: The Cliffnotes Version

CISPA: The Cliffnotes Version

If you spend a lot of time online, especially on Facebook, you should definitely know what CISPA is. The Cyber Intelligence Sharing and Protection Act is that little piece of paper that allows/requires technology companies to share the information they’ve harvested from their customers with the United States Government. It’s meant to protect the United States government ...

6 Must-Have Programs To Protect Your Computer (For Free)

6 Must-Have Programs To Protect Your Computer (For Free)

Your computer contains parts of your life. Everything you do is tied up in it somehow. You must protect it. Hackers can be real dicks. They exploit malicious code. This malicious code can get into your computer. Depending on how adept the hacker is this code could make your computer sniffle. Or cough. Or die a ...

Oxford Blocks Google Docs in ‘Extreme Action’ Against Phishing

Oxford Blocks Google Docs in ‘Extreme Action’ Against Phishing

Oxford University’s problems with phishing came to a head this week as the university’s network security team temporarily blocked access to Google Docs in an attempt to stop spammers from comprising email addresses on its trusted system. The action against Google Docs was taken after a slew of attacks that used forms to acquire email ...

Android Malware Could Hack Your PC, Upload Phone Data

Android Malware Could Hack Your PC, Upload Phone Data

Windows users are accustomed to malware and the dangers it can present. An attack on your PC could easily put your personal data and online credentials at risk. Now, with mobile phone software becoming more sophisticated, malware is a problem that could follow us anywhere.  And an Android app recently discovered on Google Play, disguised as ...

How To Avoid Being Tracked Online

How To Avoid Being Tracked Online

When we come to college, oftentimes we buy a new laptop to use for school. This point can come right before you start your college career or in the middle of it, and when it does, it is our duty to ensure our own identity and our computer’s security protection packages are all squared away. ...

Stop Sharing Your GPS Data on Facebook

Stop Sharing Your GPS Data on Facebook

The technology behind GPS, or global positioning services, offers conveniences that can be useful, as evidenced by the explosive popularity of GPS devices used for directions. As the technology has been refined, features like restaurant reviews, locations for hospitals and even the nearest Starbucks were added to GPS systems. GPS technology was enabled in some ...

Getting A Degree Without Losing Your Identity

Getting A Degree Without Losing Your Identity

Going to college is an exciting time for many young adults, but it is also a risky time when it comes to theft of personal belongings or even identity. College students have a wide range of reasons that contribute to the risk of identity theft or the theft of other personal items, so it is ...

Four Tips for Sneaking Food Past Security

Four Tips for Sneaking Food Past Security

A lot of places such as amusement parks, music festivals, and sporting arenas have ludicrous “no food allowed” policies.  By not allowing food, these places gain a sort of monopoly and are able to charge outrageous prices for their unhealthy food. So, unless you want to pay $15 for a greasy hot dog and a ...

PREV12