If you haven't heard about the Heartbleed vulnerability by now then you must have had your TV, computer, and phone turned off for the last week.
Heartbleed is probably one of the scariest, most far reaching vulnerabilities, of recent times. Why is it so scary? The main reason is because it's related to a core security technology that is used by a ton of companies, governments, and other folks.
In this week's article, What You Need to Know About Heartbleed, we'll help you deal with the Heartbleed vulnerability, whether you're an end user trying to protect yourself or a system administrator trying to protect both users and data.
Cordless phones. You use them every day in your home. Did you ever stop to wonder if there was any way that someone could listen in on your conversations?
In this week's featured article: Is Your Cordless Phone Being Hacked? We'll discuss how various types of cordless phones might be prone to eavesdropping and look at some ways of mitigating the risk of someone listening in.
Have you ever thought someone was listening in on your cordless calls? What made you suspicious? Let us know your experience int the comments area:
Portable Wi-Fi hotspots are all the rage these days. Most modern smartphones even have them built-in.
People are a lot more cautious with their mobile hotspot bandwidth, as the days of unlimited bandwidth seem to be behind us. In this week's featured article, we'll show you How to Secure Your Portable Hotspot.
Do you use a mobile hotspot? Do you leave it open for everyone to use or do you restrict access? Let us know your thoughts about mobile hotspot security in the comments section below:
Are you tired of your neighbors getting a free ride off of wireless network? Their not only getting free Internet, they're also eating up your bandwidth.
In our featured article: How to Detect and Remove Wi-Fi Freeloaders from Your Network, we'll show you how to end their gravy train.
Do you think your neighbors are using your wireless network without your permission? Tell us about it in the comments area.
Are you a telecommuter? Does your company provide adequate security for your work-at-home PC or do they rely on you to take some of the burden on yourself?
This week, our featured article will provide some Security Tips for Telecommuters. We'll show you how to help ensure that you don't become your companies weakest link.
Do you telecommute? Do you think it's more or less secure than working onsite? Let us know your opinion in the comments area:
Spring is here and love is in the air. Millions of people are looking for love online. Unfortunately, they are also encountering the dark side of the online dating world: creepers and criminals.
In this week's featured article: Online Dating Security Tips, we'll look at some things you can do to help keep yourself a little safer while you look for love online.
Have you ever had a bad online dating experience? Tell us about it in the comments section below:
When you clean out the "recycle bin" or "trash" folder on your computer, you probably expect the files to be gone for good at that point, right?
What if they we're still recoverable but you didn't know it? That's exactly what we're going to talk about in this weeks featured article: Data Remanence Security. We'll give you some tips to help you determine if the file you thought was deleted is really gone, or if it could still be recovered with the right tools.
Have you ever sold a computer with a hard drive still in it? Did you format it or just delete the files? Let us know your thoughts in the comments area.
Is your company's sensitive data walking out the door right under your nose. We worry a lot about hackers, but what about the insider threat?
How do you prevent employees from leaking your critical data. Maybe they do it accidentally or maybe on purpose. Either way, in this week's featured article, Preventing Employee Data Leaks, we'll give you data loss prevention tips so that you don't lose your company's critical data that might put you out of business?
Do you think hackers or insiders are the bigger threat? Let us know your thoughts in the comments section.
Your Facebook account has been hacked, you don't know how, why, or by whom, but you want to do something quick to stop the bleeding because your losing friends by the minute.
Fortunately, we've got your back. Check out our Article Help! My Facebook Account Has Been Hacked! for instructions on what you need to do to take control back from the hackers.
Has your Facebook account ever been hacked? Let us know your horror story in the comments section below:
Did you accidentally delete a file and then empty out your 'recycle bin'. Is it really gone or can it still be recovered.
The answer to this question depends on several factors, but there may be more hope than you realize. Check out our article on How to Recover A Deleted File for tips on how to perform some DIY computer forensics file recovery procedures.
Have you ever successfully brought a file back from the dead using a file recovery tool? Which one did you use? Tell us your story in the comments area below: