The Federal Trade Commission charged social network MySpace LLC with falsely representing the protection of its millions of users’ personal information. On May 8, 2012, the FTC made public its press release noting the conditions of the agreed settlement between the FTC and MySpace LLC. So, what did MySpace do? According to the FTC, MySpace […]

Last August, Facebook released their Facebook Messenger app for smart phones. This app is great for communicating with large groups of people (like party planning) so that everybody is involved, and also for allowing a friend to locate you in case you are lost or are meeting up at an unfamiliar location. In many ways, […]

Chances are you have a lot of accounts. Personally I have accounts (and passwords) for sites that I don’t even remember. And while I have more accounts than most due to my profession, I would bet many people deal with the same problem I do: Password Overload. Password overload is when you attempt to use […]

Are you considering selling your old laptop or smartphone? As some of us may be aware, deleting files or data from these mobile devices is not enough. The truth is that some of what we think are “files” in these devices are actually “shortcuts,” and deleting these from the devices will not delete the files […]

“Botnet,” has become commonplace terminology in the world of cyber-security. This term is used to refer to a network of private computers (or bots) infected with malicious software and controlled as a group without the owners’ knowledge. Major breach and hacking events over the past few years have awakened many to the potential dangers created […]

A recent study done by a cyber security firm known as F-Secure, found that 58 new threats to the Mac operating system were discovered between April and December of 2011. It is a commonly perpetuated falsehood amongst consumers that viruses and malware are only issues for PC platforms, not Macs. Unfortunately, this is a fallacy. […]

M86 Security, a global expert in real-time threat protection recently published a security review on the most recent trends they are seeing in cyber-threats during the second half of 2011. After probing e-mail threat tendencies and the Web in general the report makes some interesting assertions. Most notably, taking note of spam trends, the study […]

In today’s world of commerce and travel, we’re all used to many public places offering free wifi to consumers. Open wifi connections are convenient. They allow us to leave the office and do work outdoors, do homework at a coffee shop rather than at home, or access important information almost anywhere. But though open wifi […]

Imagine these scenarios: You are on vacation and you open your laptop in your hotel room. You log into the public wifi network, and quickly agree to the Terms and Conditions (without reading them of course), and start to do your normal Internet activities. For just a second, you have a fleeting thought: “Is my […]

When it comes to web browsers, you have options. The ultimate goal of any web browser is to provide people with a better Internet experience. Regardless of your preference, ask yourself what makes for a better Internet experience? According to Firefox, they provide an “open community” where the key features are “openness, innovation, and opportunity.” […]