Strategies for SafetyDoes your personal safety mean everything to you? If it does, self-defense planning cannot be quick and easy. Developing and using the steps listed below may ensure a healthier ...
Zombie PCs, Home Computer Hacking, and Drive-by Hacking By Etienne A. Gibbs, MSWInternet Safety AdvocateSpyware, Keyloggers, Hackers, Cyber Terrorists, Cybercriminals, Cybergangs, etc. These threat...
Are Viruses, Spyware, Trojans, and Hackers Hiding in Your Software? By Etienne A. Gibbs, MSWInternet Safety AdvocateSpyware, Keyloggers, Hackers, Cyber Terrorists, Cybercriminals, Cybergangs, etc. The...
MySpace and other social networking sites offer thriving communities where young people engage in countless hours of banal chatter and photo sharing. Not coincidentally, these social networking sit...
If your son or daughter is a recently high school graduate and college freshman, he or she is the ideal target cybercriminals are looking. "Why?" you might ask. For cybercriminals the answer is eas...
While surfing the 'net, I came across a report about the reduction of identity theft and identity fraud. Obviously, it caught my attention. Following, in part, is that report which was produced by Jav...
A ring of cybercriminals recently broken up by Russian authorities used keylogging software planted in e-mail messages and hidden in websites to draw over $1.1 million from personal bank accounts i...
When the Super Highway became commercialized, its use was intended for the free and legitimate exchange of information and instantaneous communication. It was a fairly innocent medium, awkward to some...
Two out of five identity theft victims surveyed by the Identity Theft Assistance Center (ITAC, a nonprofit organization dedicated to fighting identity theft through victim assistance, research and law...
Organized crime seems too be extremely active in the scam known as "phishing" in which they send emails under the guise of being a financial institution or other legitimate organization. In the em...