What is a Man-in-the-Middle Attack?

There’s a reason why most people feel uncomfortable about the idea of someone eavesdropping on them—the eavesdropper could possibly overhear sensitive or private information. This is exactly the risk that computer users face with a common threat called a “Man-in-the-Middle” (MITM) attack, where an attacker uses technological tools, such as malware, to intercept the information you send to a website, or even via your email....more

10 Ways to Help Protect Yourself from Identity Theft

No one wants to be a victim of identity theft (at least not that I’m aware of). But even though we may say this, our actions don’t always indicate this—and actions speak louder than words.Some of this information may seem basic or like common sense, but these are still tactics that identity thieves utilize because THEY WORK! So here are some tips to make sure you’re protecting your identity:...more

Analyze Security to reduce Threats

A deep analysis into security (security analytics programs) unveils some riveting areas that need to be addressed if business users are serious about reducing threats of data breaches....more

Risks and solutions when cloud computing

A public cloud service can bring on five risks to a business. Here they are, and their solutions.The three A’s: authentication, authorization, access control. Here are some questions to ponder about a cloud service:...more

How do I protect myself engaged in the internet of things?

The Internet of Things—IoT—is a formal term referring to distinctly identifiable objects (cars, kitchen appliances, smartphones) and their cyber-representations on the Internet.By 2020, it’s projected by at least one expert that there will be over 30 billion “things” represented virtually. All of this gives rise to increased security risk that seems almost paranormal....more

10 tips to keep your data private online

The Internet has become an essential tool for most of us and a part of our everyday lives. We rely on it to send/receive emails, post/share photos and messages on social networking sites, shop for clothes, search for information, etc. But how do all these online activities affect your privacy?...more

For when someone buys a domain with YOUR name on it: Part I

Whether you're a celebrity, a business owner looking to expand online, or a professional pig wrestler, you should buy a domain with your name on it. It's awkward to be online and realize that som...more

5 Digital New Year’s Resolutions For Parents

McAfee recently distributed a press release and the line that caught my eye was, “Now is the time for parents to model good behavior and etiquette.”  it This wasn’t something you’d normally expect to see from a major security company, so intrigued, I read on....more

The Permanency of the Internet

I've been thinking a lot lately about what I write about my family and about what others write. Frankly, I don't think enough people think about it seriously enough.There's a certain permanency on the Internet that lasts longer than people's memories. Even if you take down a site or a blog, there are always personal caches, screenshots and The Wayback Machine archive. ...more