pdf_blog

Adobe PDFs and Security

Adobe’s suite of software offerings is one of the most popular programs in the world — which is precisely why it is also one of the most targeted and exploited platforms as well. ...
checkin_blog

The Risks of ‘Checking In’

Sure, it sounds like a great idea to check into your favorite bar or coffee shop on Facebook, Foursquare, Yelp, or any number of applications that let you make similar announcemen...
Clean PC

Spring Clean Your PC

It’s that time of year again: when you put away your winter clothes, realize you haven’t gone to the gym nearly enough to be ready for swimsuit season — and clean out your compute...
Computer Attack

What is a Man-in-the-Middle Attack?

The goal of most attackers, regardless of how they go about their business, is to steal user data. That could be in small, discrete attacks on individual users or it could be in l...
spam

Five Popular Spam Scams

Everyone should know by now that there are, sadly, no members of deposed African royal families who want to share millions of dollars with you, no strings attached. What everyone ...
password

What kind of passwords do people use

With the increasing importance of online life, each of us faces the need to use more and more web services: social networks, e-mail, online banking and so on. Each service require...
webcam-feat

Beware of Webcams!

Attackers trying to infect your computer with malware capable of remote access don’t necessarily seek money; some cybercriminals are just having fun. The most valuable items to th...