Blog Archives

Cyber Security Explained: Baiting

Baiting involves a piece of portable electronic storage media like a CD, laptop or USB stick drive left at or close to the target’s workplace in order to tempt the curious victim into seeing what’s on it. In effect, the

Share Button
Tagged with: , , , , , , ,
Posted in Fraud & Scams, Network Security, Security Tip of the Week

What is Trojan Horse Malware?

Computer Security Tip of the Week Scott Aurnou – A Trojan horse (or Trojan, for short) is the security world’s version of a wolf in sheep’s clothing. Learn more about them – and what you can do to protect yourself

Share Button
Tagged with: , , , , , , ,
Posted in Fraud & Scams, Laptops & Desktops, Network Security, Security Tip of the Week

Are You Giving Away Your Location When You Post Photos Online?

Computer Security Tip of the Week Scott Aurnou – Many modern cameras and smartphones include location data when taking photos and, when those photos are then uploaded to the Net, that information goes with it. This can include personal photos,

Share Button
Tagged with: , , , , , , , , , , , ,
Posted in Fraud & Scams, Privacy Issues, Security Tip of the Week, Smartphones & Tablets

How Effective Are Biometric Security Measures?

Computer Security Tip of the Week Scott Aurnou – Biometric security measures like fingerprint scanners have been incorporated into a few products recently, but do they provide effective protection or are they more of a novelty at this point? If

Share Button
Tagged with: , , , ,
Posted in Laptops & Desktops, Network Security, Security Tip of the Week, Smartphones & Tablets

What is Social Engineering?

Computer Security Tip of the Week Scott Aurnou – Why would a hacker engage in a potentially time-consuming and difficult attack against a well-guarded computer network or secure location when he or she can simply trick someone into giving them

Share Button
Tagged with: , , , , , , , , , , , , , ,
Posted in Fraud & Scams, Laptops & Desktops, Network Security, Security Tip of the Week