hoodie B A Pixabay2

Fake Microsoft login screens (Office 365)

Post #4 in threat types Hackers are creating fake Microsoft login screens using official logos and text. Abusing Microsoft’s branding is one more dirty trick in the hackers’ toolbox. “Branding” …

stockvault.net ransomware 236600

Prevent ransomware attacks now

Post #3 in threat types Everyone knows that feeling. Being in a relaxed situation and suddenly recognizing betrayal. Whether it’s a personal matter or scammers targeting you, it hurts. What …

phishing Image by Tumisua from Pixabay.SocMedia

Best phishing counter-attacks

Post #2 in threat types Could you be the next target for a phisher? Is that term even familiar? Phishing is a method of trying to gather personal information using …

despoof jefferson santos 450403 unsplash

De-Spoof Your Email Inbox

Post #1 in threat types Crooks send fake email so they can take other people’s money. Regardless of the text inside the email, the intent is some variation on unfairly …

lettering code Markus Spiske on Unsplash.900px

Finding free anti-malware info

Where will malware pop up? The problem is, you’re not sure where to look for danger. Is malware already in one of your computers? How much damage might it cause? …

blog chips circuit board 1200px

5 Do-It-Yourself Computer Tips

Some tweaks don’t need a paid professional! Take charge of your workstation with these do-it-yourself computer tips! 1- Install the right software; choose carefully! Do you really need that quirky …