Tag Archives | identity theft protection

The best internet security VPN for OSX

9 OS X malware you need to watch out for

For years since being launched in March 2001, OS X had been virtually untouchable by malware. Recent years, however, saw the rise in the number of malware strains targeting the system. This means that existing protection measures such as firewalls and security software are not enough for the job; you must also use additional tools […]

Continue Reading · 0
Ways to protect against identity theft

10 Gadgets and Tools to Help You Protect Your Identity and Your Money

Protecting your identity and personal information is critically important in today’s hyper-informational technology age. Thieves, hackers, and con artists are constantly coming up with new, creative, and all too-clever ways to gain access to some of your most personal, distinguishing information. The good news is that there are steps you can take to help protect […]

Continue Reading · 1

AT&T Hacker Gets 3+ Years in Jail for Leaking 114,000 iPad User Emails

With company security breaches occurring more often, there has been an increase of reported identity theft and fraud. An AT&T Hacker named Andrew Auernheimer, also known as “Weev”, was recently sentenced to 3+ years in jail for hacking into the company’s website and leaking 114,000 iPad user emails. Not only will he serve jail time, […]

Continue Reading · 0

What Kind of Wireless is Secure…and What Isn’t?

WiFi was born to be convenient—but not secure. More than anything, though, it depends more on what kind of wireless we’re talking about. Public. Free, unsecured WiFi is the least secure. Shared WiFi in public, at home or in the office lacks encryption of the data packets streaming from the connected devices. In other words, your […]

Continue Reading · 0

What’s a Wireless “Sniffer” and Why Should I Care?

A sniffer is a software program used by IT administrators to monitor network usage, investigate network problems, investigate network misuse and abuse, identify configuration issues and determine the state of a network’s security. Sniffers ultimately decode the data so it is readable in words, numbers and computer code. Note that last part: “determine the state […]

Continue Reading · 0