Antivirus Blog and Resources

Featured Posts

Card image cap
6 Ways to Stay Safe Online

In the last several years cyber security has become a major issue, not only for major stores like Home Depot, Target, a...

Read More
Card image cap
Never Put These Docs in Your Wallet

Yes, believe it or not, you CAN get by in life with a wallet that just has a little cash, a store card or two, one to tw...

Read More
Card image cap
Google Alert Scams

If you want to know the latest on "any topic," just sign up for Google Alerts. Google will e-mail you notifications of n...

Read More

All Posts

  • Generic placeholder image
    How to Prevent IRS Scams
    Once a thief knows your Social Security number . . . you're at very high risk for having your identity stolen. A report on bankrate.com says that the IRS is warning of a cyber attack on its electronic filing PIN application. ...
  • Generic placeholder image
    Popular Passwords Make it Easy to Hack You
    Your account passwords should be as unique as your fingerprint-to make them less hackable by crooks using password-guessing software that can run through millions of possible combinations in just minutes. And if you have an e...
  • Generic placeholder image
    Is a Deleted File Really Deleted?
    The term "delete" should be replaced with "archived" or "hidden" on computers so users are no longer fooled into thinking that once you "delete," the file is gone forever. Even when you delete something in the recycle bin, i...
  • Generic placeholder image
    How to Protect Against Tax Identity Theft
    What are you doing to prevent tax identity theft? Do you even know what steps to take? You'd better, because this crime has tripled since 2010, says the FTC. A report on foxbusiness.com describes tax identity theft as the ac...
  • Generic placeholder image
    How Much Is Your Data Worth Online?
    Cyber crime sure does pay, according to a report at Intel Security blogs.mcafee.com. There's a boom in cyber stores that specialize in selling stolen data. In fact, this is getting so big that different kinds of hot data are ...
  • Generic placeholder image
    2016 Information Security Predictions
    No bones about it, 2016 is sure to see some spectacular, news-chomping data breaches, predicts many in infosec. If you thought 2015 was interesting, get your seatbelt and helmet on and prepare for lift off... Wearable Device...
  • Generic placeholder image
    How to Remove Fraudulent Lines of Credit
    You just learned you have a new credit card account by checking your credit or because a bill collector called you. Problem is that you don't remember ever applying for it. You must find out what's behind this new account an...
  • Generic placeholder image
    How to Shop Securely with a Mobile Phone
    "You can buy things with your phone!" No kidding! But imagine what the response would have been had you made this statement in 1984: "Off your meds, eh?" Purchasing via the smartphone may very well eclipse the popularity of ...
  • Generic placeholder image
    How to Protect Your Car from Being Hacked
    If you're half asleep or texting while driving (which are both deadly), and you crash the car into a building...it may be zero percent your fault. That's because hackers can now "get into" a smartcar and make it crash-theore...
  • Generic placeholder image
    How to Unsend or Cancel an E-Mail
    If the person you are sending an e-mail to pretty much instantaneously receives it, how on earth can you unsend or cancel it? Well, you have several options. Criptext This is a browser plug-in that works for Chrome and Safa...

Compare the top ranked companies

Find the right company for you.

AVG image #1
McAfee image #2
Norton by Symantec image #3
Intrusta image #4
BullGuard image #5
VIPRE image #6 View
More