Category Security

The Most Popular Facebook Scam: Profile Cloning

fbeviltwin1

We all love using Facebook to connect with people, read articles, and see pictures of friends and family. What if you are looking for a friend of yours that you have not seen in years, and come across a Facebook page that you believe is your friend’s but in reality has been created by a scammer?

Scammers are using a tactic called ‘Profile cloning’. The tactic has been around for several years but is becoming more prevalent in 2016. It has become a serious security threat. Scammers have recently been targeting people over the age of 50, the majority being women.

Many people whose Facebook page has been cloned are claiming to friends that they have been “hacked” however this term is not completely accurate...

Read More

Will Stagefright kill Android?

stagefright
I’ve been a big fan of Android phones since day one. I went from using a Blackberry to an Android and never looked back. Of course with features and versatility comes risk. Over 950 million Android phones are out there being used every day. We store our phone numbers, e-mails, calendars, private notes and all kinds of other important data on our phones.

A security vulnerability that could hack, steal or even erase your data is a serious problem

So when a security vulnerability is found in the Android operating system that could hack, steal or even erase that data…that’s a serious problem. It’s called the Stagefright vulnerability (aka Heartbleed for Android).

It was found by Joshua Drake, a security researcher, back on April 9th...

Read More

Is your cell phone safe?

7 tips on downloading mobile apps and increasing your phone’s security.cell phone security

It seems that almost everyone owns a smart phone. You can access the internet, e-mail, share files, play games and even print. All that information can be stored on your phone; does this mean we should be concerned about security? You bet.

Here are some ways to keep them out:

  1. You get what you don’t pay for.
    Most free apps you can download in the app store are sponsored in order to help pay for the app and its updates. Some use simple ads, while others gather information from your phone and sell it to marketers to pay the bills. Apps that you pay for are less likely to do this.
  2. Just say no to 3rd party apps.
    Some people have found ways around paying for apps by downloading them from websites. Stay away from this...
Read More

Russian hackers may have your password

“Russian hackers steal over a billion passwords”

hacker

Recently in the news we heard about a group of Russian hackers who managed to steal 1.2 billion usernames and passwords. While we still don’t know what the hackers were planning to do with these passwords, there is one thing we can safely assume, it won’t be good.

What can we do?
Change your passwords right away. We should not give them time to use any of the information they have taken. Keep in mind there are some important guidelines to maintaining your security. Here are some tips on how to do so:

1)      Do not use old passwords. If you have used the password online in the past, chances are they already have it. Come up with a completely new password.

2)      Do not use common knowledge passwords...

Read More

Leaving XP

I’m sure you’ve heard that Windows XP support has come to an end. As a result, your old XP system is more at risk with each passing day. You may still be very happy with XP or may feel like you have no choice but to stick with it due to some old software or a printer you have that only works with DOS or XP, so here are your options.Read More

Keys to Protecting Your Network From Cyber-Attacks

More than half of businesses across the world lack the ability to detect security breaches to their networks within a short period of time. Just think about how much valuable information can be lost, tampered with or stolen in just a matter of minutes? With current technology, there is no need to take the risk of a cyber attack. Data center monitoring is quickly becoming the top priority for businesses all over the world. But what does it take to achieve 100% visibility for ultimate data center security? APCON explores this topic in the following infographic.

[Click image for full size version]

Keys to Protecting Your Network From Cyber-Attacks

Read More

Microsoft Tech Support Scams

Microsoft is not in the business of scamming people, at least not the real Microsoft. There have been in the last year or so, companies that because they are located in other countries, have gotten away with posing as Microsoft and offering tech support help to people in need.

They call you, pretending to be Microsoft tech support and tell you that they have noticed that your computer is having problems. Then they have you go to a fake website and change some settings on your computer so they can “help” and then, at the end of the call, tell you it costs X amount of money. By then your computer is probably worse off than it started.

How do they know you need help when they call? Good question...

Read More

AOL=RUN

Ladies and gentlemen another public service announcement. If you are using AOL email, RUN. If you are using the AOL software RUN. If you are using AOL anything. RUUUNNN! Seriously. It's all packed to the brim with spyware. I am not kidding. Get another email, do not use any of their services.Read More

Java Updates

Today I would like to talk about the importance of Java updates. Java is a programming language commonly used in webpages and certain applications that add advanced functionality. Why is updating Java important? In a word; security. Read More