phishing Image by Tumisua from Pixabay.SocMedia

Best phishing counter-attacks

Post #2 in threat types Could you be the next target for a phisher? Is that term even familiar? Phishing is a method of trying to gather personal information using …

despoof jefferson santos 450403 unsplash

De-Spoof Your Email Inbox

Post #1 in threat types Crooks send fake email so they can take other people’s money. Regardless of the text inside the email, the intent is some variation on unfairly …

lettering code Markus Spiske on Unsplash.900px

Finding free anti-malware info

Where will malware pop up? The problem is, you’re not sure where to look for danger. Is malware already in one of your computers? How much damage might it cause? …

blog chips circuit board 1200px

5 Do-It-Yourself Computer Tips

1- Install the right software; choose carefully! Do you really need that quirky free shareware? Maybe it will just distract you, or bring along some malware for the ride. Is …