Antivirus Blog and Resources

Featured Posts

6 Ways to Stay Safe Online

August 18, 2017

In the last several years cyber security has become a major issue, not only for major stores like Home Depot, Target, a...

Read More
Never Put These Docs in Your Wallet

May 17, 2016

Yes, believe it or not, you CAN get by in life with a wallet that just has a little cash, a store card or two, one to tw...

Read More
Google Alert Scams

May 10, 2016

If you want to know the latest on "any topic," just sign up for Google Alerts. Google will e-mail you notifications of n...

Read More

All Posts

  • Generic placeholder image
    Protect Yourself from Holiday Shopping Scams
    Even though the highly publicized retail data breaches have involved off-line brick and mortar stores, this doesn't mean that security is high with online shopping. Scammers and hackers are waiting for you in more ways than ...
  • Generic placeholder image
    How to Stop Teenage Sexting
    Sexting is the act of sending images of a sexual nature via cell phone, often naked pictures. Because texting technology is so readily available and easy to understand, parents should be quite leery of telling themselves, "O...
  • Generic placeholder image
    How to Kick People Off Your WiFi
    If someone is "borrowing" your Wi-Fi service, there's more to this than just the nerve of someone secretly mooching off of you. Their use of your service could interfere with bandwidth and mess up your connection. If they're...
  • Generic placeholder image
    Save Money with the Nighthawk 2-in-1 Cable Modem-Router
    If you are like most people, there are several devices in your home that fight for WiFi connections at any given time. This slows your network, and gives you a shoddy experience. Instead, look into upgrading your system immed...
  • Generic placeholder image
    How to pwn Anyone
    Define Pwn: Pwn is a slang term derived from the verb "own,"as meaning to appropriate or to conquer to gain ownership. The term implies domination or humiliation of a rival. And when it's done by hacking email, the perso...
  • Generic placeholder image
    What Are Bug Bounties?
    A bug bounty refers to the reward a bad-guy hacker gets upon discovering a vulnerability, weakness or flaw in a company's system. This is akin to giving a reward to a burglar for pointing out weaknesses in your home's securi...
  • Generic placeholder image
    Infrastructures Under Attack
    It's been stated more than once that WWIII will most likely be cyber-based, such as dismantling a country's entire infrastructure via cyber weapons. And don't think for a moment this doesn't mean murdering people. A report a...
  • Generic placeholder image
    Hack Computers with Your Eyeballs
    Hacking a computer with your eyeballs refers to visual hacking: unauthorized spying on what someone has on their computer screen, mentally collecting that information (or jotting it down) and then using it against that indiv...
  • Generic placeholder image
    How to Prevent Your Pics from Being Lifted: Part 2
    For Part 1 of this article, CLICK HERE. There are many reasons someone might right-click on your image and "Save image as..." Porn, Sex and Dating Sites A woman might steal your blog headshot and use it for her dating site ...
  • Generic placeholder image
    Dept. of Homeland Security Computers Vulnerable
    There's a problem on the home front: security lapses in the computers of the Secret Service and Immigration and Customs Enforcement, says a report on These departments were recently audited, and weaknesses were ...

Compare the top ranked companies

Find the right company for you.

AVG image #1
McAfee image #2
Norton LifeLock image #3
Intrusta image #4
BullGuard image #5
VIPRE image #6 View