Well, the infamous "Cyber Monday" online shopping is nearly upon us. Did you skip Black Friday in favor of better online deals?
Before you start clicking on sale ads and coupon emails, check out our article: Tips For Avoiding Cyber Monday Scams to learn how to protect yourself (and your money).
Have you ever been scammed during your holiday shopping? Tell us all about it in the comments section below:
Your birth date. It seems like a harmless bit of data, but it might bring an identity thief one step closer to successfully obtaining enough information to impersonate you. Are all those "happy birthdays" on your Facebook timeline worth the risk?
In this week's article: 5 Things You Should Remove From Your Facebook Profile, we'll discuss why birth dates, and certain other bits of personal information, would be better kept private.
Do you think posting your birth date on Facebook is risky? Let us know what you think in the comments section below:
Did you just get a new computer as a gift? Maybe you bought one for yourself. Either way, the best time to secure your new computer is when it's fresh and untainted by malware.
In this week's featured article: Securing Your New Computer, we'll go over 5 steps you need to take as soon as you get it out of the box.
Did you just get a new computer? What kind of security-related software came with it? Let us know in the comments section below:
Did some beautiful model just send you a Facebook friend request? You try to remember if you know this person from anywhere, but you're coming up blank? Are they legit or are they a scammer, or something worse?
In this week's featured article: How to Spot a Fake Friend Request, we'll find out some reasons why people might send you a fake friend request and we'll show you some clues to help you spot them.
How many fake friend requests do you think you have received? Tell us your experience in the comments section.
There are some really great trade-in deals out there for those of you with an old iPad that you're looking to trade in for a newer model.
Before you rush to trade or sell your iPad, check out our article: How to Erase Your iPad Before You Sell it, and make sure that you have removed all of your personal data from it so it doesn't fall into the wrong hands.
Have you ever forgotten to erase your data from a device before you sold it? Did it cause you any grief? Share your story in the comments section below:
Short links or shortened links can make a really long website easier to fit into the confines of a twitter post. They're also a lot easier to write down and remember. The problem with these links is that they can be used by hackers and malware distributors to hide the true destination of a malicious link.
Check out our featured article: The Dangers of Short Links to learn how you can see where a short link's destination leads without having to visit it first.
Have you ever encountered a malicious short link? Let us know your experience in the comments section.
A gas pump, an ATM machine, a Point-of-sale Kiosk. What do all these things have in common? They are all likely places where you might encounter credit card skimming devices.
What is a credit card skimmer? How can you spot a skimmer? We'll answer these questions and more in our featured article: How to Avoid Credit Card Skimmers.
Have you ever found a credit card skimmer? Let us know your experience in the comments section below:
As soon as the clock strikes midnight on Halloween, you can bet your bottom dollar that retailers will begin sending out emails and updating their websites with all kinds of great Christmas deals.
Before you start your virtual shopping trip, check out our Tips for Shopping Safely Online.
We'll give you some tips on how to protect your personal and financial information and offer advice on how keep from getting scammed.
Did you know that your wireless internet router probably has a built-in hardware-based firewall? You might not even have it turned on. If it's not enabled, you're missing out on a powerful security feature that you may have already paid for.
Check out this week's featured article: How to Enable Your Wireless Router's Built-in Firewall for instructions on where to find it, and how to enable and configure it.
Are you using a firewall? Do you think it has helped prevent your computer from falling victim to hackers? Let us know your thoughts in the comments section:
What makes someone an attractive target for hacker attacks? What makes it easier for hackers to compromise your computer or account compared to someone else?
In this week's featured article: 5 Common Mistakes That Might Get You Hacked, we'll look at 5 of the most common security no-no's that may result in you getting "pwned" as the kids say. We'll also give you some tips on how you can avoid becoming an easy target.
Have you ever made any of the mistakes mentioned in the article? Did you get hacked as a result? Let us know your experience in the comments section below: