Fandalism is a website that claims to be for musicians; however, MUSICIAN BEWARE! Fandaslim chooses to violate your, and your friends, privacy. You are not doing yourself, nor your friends, any favor by utilizing this privacy violation and security risk. This is how a typical Fandalism Facebook…
Google has released Chrome 17.0.963.83 for Linux, Macintosh, Windows, and Chrome Frame to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code or cause a denial-of-service condition.US-CERT encourages users and administrators to review the Google…
The internet is at our fingertips with the widespread use of internet-enabled devices such as smart phones and tablets. When traveling and shopping anytime, and especially during the holidays, consider the wireless network you are using when you complete transactions on your device.Know the…
Attackers are continually finding new ways to access computer systems. The use of hidden methods such as rootkits and botnets has increased, and you may be a victim without even realizing it.What are rootkits and botnets?A rootkit is a piece of software that can be installed and hidden on your…
ISPs offer services like email and internet access. In addition to availability, you may want to consider other factors so that you find an ISP that supports all of your needs.What is an ISP?An ISP, or internet service provider, is a company that provides its customers access to the internet and…
Bullies are taking advantage of technology to intimidate and harass their victims. Dealing with cyberbullying can be difficult, but there are steps you can take.What is cyberbullying?Cyberbullying refers to the practice of using technology to harass, or bully, someone else. Bullies used to be…
Children present unique security risks when they use a computer—not only do you have to keep them safe, you have to protect the data on your computer. By taking some simple steps, you can dramatically reduce the threats.What unique risks are associated with children?When a child is using your…
USB drives are popular for storing and transporting data, but some of the characteristics that make them convenient also introduce security risks.What security risks are associated with USB drives?Because USB drives, sometimes known as thumb drives, are small, readily available, inexpensive, and…
Online trading can be an easy, cost-effective way to manage investments. However, online investors are often targets of scams, so take precautions to ensure that you do not become a victim.What is online trading?Online trading allows you to conduct investment transactions over the internet. The…
Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you would recognize and typically consider safe, so you should take precautions when opening files from other people.What types of files can attackers corrupt?An attacker may be…
There are some common myths that may influence your online security practices. Knowing the truth will allow you to make better decisions about how to protect yourself.How are these myths established?There is no one cause for these myths. They may have been formed because of a lack of information, an…
The popularity of social networking sites continues to increase, especially among teenagers and young adults. The nature of these sites introduces security risks, so you should take certain precautions.What are social networking sites?Social networking sites, sometimes referred to as…
ACLU — This spring, Congress is considering legislative proposals intended to enhance cybersecurity, debating whether new authorities are necessary to combat crime, terrorism and espionage on the internet. Some are proposing extraordinary new programs that may infringe on your First and Fourth…
Cisco has released three security advisories to address vulnerabilities affecting the following products:Cisco ASA 5500 Series Adaptive Security Appliances (ASA)Cisco Catalyst 6500 Series ASA Service Module (ASASM)Cisco Catalyst 6500 Series Firewall Service Module (FWSM)Cisco Adaptive Security…
Unsolicited commercial email may be a privacy and/or security violation under the Federal Trade Commission of the United States of America. SPAM should be forwarded to uce@ftc.gov.