The Best 5 VPNs for Google Chrome

Google Chrome has taken the world by storm as the most popular web browser. With 51 percent of the world’s internet users now on this platform, Chrome has built a dedicated following with desktop and mobile users alike. Their software works on all operating systems and has proven to be seamless and intuitively user friendly. […]

Continue Reading This Post

Security Risks On the Internet of Things: Will They Hack My Car?

Charlie Miller has been hacking computers and phones for over a decade. His ends aren’t nefarious, however: he’s a security researcher working to expose vulnerabilities that will ultimately make our systems safer. In order to raise public consciousness of the issues at stake, he’s been hoping to hack something less techy and abstract that would […]

Continue Reading This Post

Would You Know if You’ve Been Targeted by an Identity Thief?

Chances are good there’s enough information about you online at this very minute that someone so inclined could steal your identity (kick that up to “excellent” if you’re an avid user of social media and don’t have adequate privacy controls in place). Much of this information was made available before the risk of identity theft […]

Continue Reading This Post

Wipe Your Virtual Feet: Manage Your Online Reputation

Digital footprints can track virtual mud all over your professional image and personal life. Negative information about you online can do more damage than you realize. It can stick like a bad tattoo. PewInternet.org reported that 44 percent of adult men and women go online to find out more information about someone before interacting with […]

Continue Reading This Post

What is Bring Your Own Device in an Enterprise Setting?

The expansion of Information Technology (IT) into the business world has made it possible for employees to use smartphones, laptops and other mobile devices to stay connected to the enterprise. Businesses have two choices: issue devices owned by the company; or have the employees bring their own devices (BYOD). Predictions are that by 2014, 90 […]

Continue Reading This Post

Internet Privacy: Does It Still Exist?

At its inception, the Internet was seen as a haven for privacy seekers. The first news of someone getting fired for a picture he posted online was the shot across the bow for this idea. It became apparent that without the proper precautions, there was actually no privacy to be had. Instead, even a quick […]

Continue Reading This Post

Risks of Logging Into Other Sites with Your Social Media Passwords

Convenience is king. We have the option of signing in to many Web sites – from blogs to online communities to business sites – by logging in with Facebook, Twitter, and many other social-media sites. But is it safe? Here’s the scenario: You occasionally visit “downloadsRus.org” (not a real site), but can’t seem to remember […]

Continue Reading This Post

Internet Security: Why It’s Essential That You’re Protected

Protecting your computer has been a necessity for many years now and has become increasingly important with the rise of broadband and now superfast broadband. On a personal level, inadequate protection of your machine can lead to identity theft and your bank account becoming emptied; on a national level, there’s also the threat of hacking […]

Continue Reading This Post

Facebook Now Tracking Offline Purchases: Useful Innovation or Privacy Invasion?

Facebook recently inked a new partnership deal with a data metrics company called Datalogix. The goal? To keep track of Facebook users who see ads and then later go on to purchase particular items from brick-and-mortar stores. This move represents a fascinating development in the field of advertising analytics but also a concern for privacy […]

Continue Reading This Post

Privacy and Security Issues When Using Social Networks

Q: I liked your post about staying safe when shopping online. Do you have any advice for security relating to social networking sites? Friends of mine have told me some horror stories! When you’re using social networks like Facebook and Twitter, you’ll want to be careful what you post because your words can quickly become […]

Continue Reading This Post