The Internet is full of hackers and thieves, all wanting to get into your accounts. Here are 3 things you should do to make your internet life more secure.
Banks have been issuing contactless debit cards since 2008. These contactless cards allow you to pay by just tapping on the reader, but is it safe? Let check it out.
To make sure you have a secure password, LastPass comes with a security audit feature that allows you to know the strength of your overall passwords. Let check it out.
To wipe your Android phone, doing a factory reset is not enough. Here is how you can securely reset your Android device so your data is beyond recovery.
Despite all the rage on Windows 8, Microsoft has made Windows 8 more secure by introducing several security features. Here are 3 ways why it is more secure than XP and Windows 7.
As of late, many people have been hacked and are the victims of password leaks and Trojan horse infections. The following are some tips if it happens to you
Things just don’t work the way they should in the Internet. Here are some things you should know about the OpenSSL “Heartbleed” bug and how it affects you.
When you start to see weird behavior on your PC, it could be signs that your online security has been compromised. Here are 11 signs you should take note of
One proposition that security experts made recently was to use short sentences as passwords, rather than a complicated string of characters. Let’s see if this is a more secure method.
Some of the extensions in Chrome store are using hidden adware to make money off of you. Here are some fixes for you to tackle the extension security problems.
Tired of typing your username and password everytime you want to login to a site? Clef is a password replacement app that allows you to login without password.
Do you know that a simple task such as opening PDF files can infect your computer with malware? This is a very common method used by hackers to install malicious software on your system and gain access to it. Here is a list of PDF files that are known to be infected and one you will want to keep in your blacklist.
While Google has implemented two-factor authentication a long time ago, many people will wonder what took Microsoft so long to follow suit. While they are late to the game, it is still better late than never. Here is how you can activate the two factor authentication for your Microsoft account.
A browser hijacking is the practice of taking advantage of vulnerabilities in the browser to compromise the user’s computer in a manner that would serve the interests of the hijacker. There are a few ways a hijacker can achieve this, and we will detail each of them as well as discuss how to prevent them from happening.
While creating your Word document, some of you might want to secure it and prevent others from viewing or making changes to it. There are some security features in Microsoft Word 2013 that allow you to protect and secure your documents. Let’s check it out.
Securing your Android phone or tablet is quite easy. Android OS actually offers a few different options for you to secure your phone. The only question is, which option provides the best security without compromising the ease of use? Let check it out.