What Google knows about you

7:26 PM Add Comment
What Google knows about you - Most average users of the Internet are not much of an idea about how different sites track their behaviors, and they probably do not know how much personal information is tracked and saved - especially by search engines like Google Google is still the largest search...

Google Privacy Issues glass

6:25 PM Add Comment
Google Privacy Issues glass - Although Google Glass is still in "development" stage to say that only developers can buy a pair (the rich cost of $ 1500) to create applications that run on them it is only a matter of time before they are available for anyone to use. Since the announcement of Google...

The three types of malware that Scare, threaten and abuse

4:23 PM Add Comment
The three types of malware that Scare, threaten and abuse - Cyber ​​criminals are becoming more creative to come up with new methods for Internet scam users. Their latest inventions are scareware antivirus programs, ransomware, and false. What is a scareware? A scareware is a form of malware...

How to prevent cyber attacks on your business

3:22 PM Add Comment
How to prevent cyber attacks on your business - As a small business owner, you might not worry about cyber attacks as much as large companies do. However, you would be a serious mistake if you do not take appropriate measures to protect your business against cyber attacks. Your business may not...

What to Do When Your Email was Hacked?

2:21 PM Add Comment
What to Do When Your Email was Hacked? - If your friends receive e-mails from you with a link to an online store Viagra, your email account has probably been hacked. Email hacking happens more often than not. Follow the steps below to recover and protect you. Step 1. Check Your Email was Hacked...

5 ways to be more in line Anonymous

1:20 PM 1 Comment
5 ways to be more in line Anonymous - Nowadays, it seems that everything we do online is tracked. Government agencies, advertisers and hackers all trying to follow our every move online. Because of privacy, many consumers began to consider protective measures for additional information, a little...

How to protect your mobile device from malware

12:19 PM Add Comment
How to protect your mobile device from malware - Android phone Valérie behaved in a weird way, like he was possessed. The thing had a mind of its own, sending truncated texts and play. Is it a ghost? Or has it been hacked? Valorie locked the phone when he was in charge so that he would not buy...

Malvertising :. The biggest threat to mobile security

10:17 PM Add Comment
Malvertising :. The biggest threat to mobile security - Every time you use your mobile device to access the Internet, millions and millions of invisible son connect your device with the Cyberverse While the Internet is a valuable tool, it is also fertile ground for each type of digital threats,...

7 Internet Security Myths (and realities) Debunked

11:18 AM Add Comment
7 Internet Security Myths (and realities) Debunked - Most Internet users are aware of the presence wave of online threats, but too many home images exceeded by cybercriminals. Your tactics may protect against online threats from the early 00s, but the criminals are changing at an astonishing speed....

10 ways to protect your Gmail account

9:16 PM Add Comment
10 ways to protect your Gmail account - Protecting your Gmail account means you must activate some tools that Google offers, and you should increase your scam savvy intelligence for yto spot phishing scams. If you do both, you can have a very well-protected Gmail account. 1. Google 2 Step verification...

15 ways to prevent travel related to identity theft

8:15 PM Add Comment
15 ways to prevent travel related to identity theft - Most of us think about the popular tourist places we want to visit, what restaurants to dine, and what to pack we make plans for the holiday. But just as important, you must also think about taking the necessary steps to protect your identity...

Big Data and Algorithms: How They Change the way we live

5:12 PM Add Comment
Big Data and Algorithms: How They Change the way we live - If you think that big data does not play a role in your life , think again. Say your little seems under the weather. You Google his symptoms and search for the best remedy against cough for children. Meanwhile, Google aggregates and analyzes...

A day in the life of your personal data

4:10 PM Add Comment
A day in the life of your personal data - During an average day, the typical Internet user reveals an incredible amount of information as she goes to his personal affairs. either completely innocent information such as love a new Internet radio station, or the most sensitive data, such as credit...

How to watch "House of Cards" on Netflix Everywhere

2:08 PM Add Comment
How to watch "House of Cards" on Netflix Everywhere - If you are a fan of the American political drama "House of Cards", you should be happy that the third season of the series will be back on Netflix from 27 February 2015. Unfortunately, for those who live abroad, you will not be able to access...

Very effective social engineering scams

1:07 PM Add Comment
Very effective social engineering scams - It is amazing how ingenious cyber criminals, but victims must also take responsibility for falling for these tricks ., particularly when the victim is a company that has failed to train its employees in cyber security measures Ransomware science...