Internet Security

Spotting Fake Facebook Emails

Spotting Fake Facebook Emails

An email has just arrived to my inbox and even though I have a high level of spam protection, the email has slipped through the filters, so "clever" are these spammers these days. The email at first glance appears to be from facebook saying that someone has commented...

How Secure is Your Password?

How Secure is Your Password?

I was really was not surprised the other day when a client contacted me and asked me to reset his password to "something easy to remember" as the one I had created for him was a bit difficult. (I set him a password with 7 characters starting  with 3 alphabet...

3 Easy Ways to Protect Your Passwords

3 Easy Ways to Protect Your Passwords

The allure of having just one password for everything is that you can do away with having to write down different passwords for different accounts. However, having the same password for all your important online accounts jacks up the risk of having them all corrupted...

Apple Releases iPhone OS 2.2 and iPhone OS for iPod touch 2.2

Apple Releases iPhone OS 2.2 and iPhone OS for iPod touch 2.2

Apple has now released OS 2.2 for the iPhone and iPod touch to address multiple security vulnerabilities. These vulnerabilities affect CoreGraphics, ImageIO, Networking, Office Viewer, Password Lock, Safari, and Webkit. Please review the Apple Article HT3318 for more...

Fake Google Adwords Phishing Emails

Fake Google Adwords Phishing Emails

This is a warning against phishing emails appearing to come from Google Adwords so if you have used Google Adwords at some point then please be on the lookout! I just received a very authentic looking email just a few minutes ago which leads you to a very authentic...

What are the benefits of an inverse email hunt?

What are the benefits of an inverse email hunt?

While it may be easy to understand what an email inverse hunt is, many people wonder why they may need to perform such a task. The answer simply is that an inverse email hunt may allow you to prevent not only spam, but slanderous materials and eliminate the threat of...

Proxy vs. a Proxy server, what is the difference?

Proxy vs. a Proxy server, what is the difference?

If you have been using the Internet for a decent amount of time, you may have heard the technical terms proxy and proxy server tossed around casually by people. However, many people interchange the word and phrase assuming they are the same thing, but in reality they...

Make Sure you are Safe in the Growing Social Network Climate

Make Sure you are Safe in the Growing Social Network Climate

Social networking has mixed reviews among many people. Typically the people who are deeply involved in the social networking scene feel that MySpace, the Facebook, and the dozens others are perfectly safe. On the other hand, many parents and people who do not visit...

Be Extremely Wary of this Nigerian Inheritance Scam

Be Extremely Wary of this Nigerian Inheritance Scam

One popular wire transfer scheme that is picking up steam in America and Europe is an urgent email that you receive from Nigeria telling you that you are entitled to a large amount of money. Usually they will reference a relative or friend that you may have known in...