Use a password in only one place.Reusing passwords or using the same password all over the place is like carrying one key that unlocks your house, your car, your office, your briefcase, and your safety deposit box. If you reuse passwords for more than one computer, account, website, or other secure…
HARRISBURG – Pennsylvania, along with 34 other states, has reached a $12 million settlement with LifeLock Inc, an Arizona-based company accused of making confusing or misleading statements in the advertisement and promotion of its identity theft protection services.“Identity theft is a major…
Terminate Computer Access Before You End a Contract or Tell People They Are FiredShortly before a labor union strike in August 2006, two Los Angeles transportation engineers allegedly disconnected traffic signals at four busy intersections. Subsequently, these disgruntled employees were accused of…
Chain letters are familiar to anyone with an email account, whether they are sent by strangers or well-intentioned friends or family members. Try to verify the information before following any instructions or passing the message along. Why are chain letters a problem?The most serious problem is from…
US-CERT asks users to be vigilant during the U.S. Census Bureau’s 2010 Census campaign and to watch for potential census scams.According to the U.S. Census 2010 website, they began delivery of the printed census forms to every resident in the United States on March 1, 2010. The only way to…
Web browsers allow you to navigate the internet. There are a variety of options available, so you can choose the one that best suits your needs. How do web browsers work?A web browser is an application that finds and displays web pages. It coordinates communication between your computer and the web…
The Federal Trade Commission has notified almost 100 organizations that personal information, including sensitive data about customers and/or employees, has been shared from the organizations’ computer networks and is available on peer-to-peer (P2P) file-sharing networks to any users of those…
The Lower Merion School District has been accused of spying on students through webcams on their laptops.“While certain rules for laptop use were spelled out … there was no explicit notification that the laptop contained the security software,” said Superintendent Christopher W. McGinley.…
There is a “pump and dump” circulating about “The $59 Computer”. A pump and dump scam usually happens with penny stock trades. A stock that sells for pennies is purchased and hyped by a “research” firm. When the price goes up from the fraudulent hyping, the originator of the scam sells…
National Cyber Alert System:The operating system is the most fundamental program that runs on your computer. It serves as the basis for how everything else works. What is an operating system?An operating system (OS) is the main program on a computer. It performs a variety of functions, including…
Better Business Bureau — The popularity of social networking continues to grow among kids. Social networking sites can provide a secure way for kids to connect with each other, but they can also be exploited for any number of nefarious purposes. Better Business Bureau recommends parents take…
HARRISBURG, PA – Agents from the Attorney General’s Child Predator Unit have recently arrested three suspected Internet predators, including a plumber from New York state who traveled to Lawrence County to have sex with what he believed was a 13-year old girl; a computer technician from…
Unsolicited commercial email may be a privacy and/or security violation under the Federal Trade Commission of the United States of America. SPAM should be forwarded to uce@ftc.gov.