Debunking 4 Security Rumors

spy_malware_54

The world of online security and privacy is filled to the brim with rumors, misconceptions, and outright lies. So if you believe something that’s not true, don’t feel bad. With every site saying something different, even the smartest get confused. However, it’s time for us to clear the smoke and debunk some of the most […]

Detecting Suspicious Email Attachments

email_attachment_risk_44

If you get an email from an unknown source, never open its attachment. While you can read the email without worry, providing that your computer is updated, you may want to avoid attachments. While email service providers typically scan and remove dangerous attachments, along with your own antivirus, some manage to slip through. Even emails […]

A Short Guide to Phishing

phishing_safe_22

What is Phishing? Microsoft’s Safety and Security Center describes phishing as the following: “A type of online identity theft. It uses email and fraudulent websites that are designed to steal your personal data or information such as credit card numbers, passwords, account data, or other information”. So phishers use techniques to steal your data, but […]

Tablets vs. Laptops: Why Tablets Are Better

laptop_v_tablets_12

Every time some new type of hardware appears, the overly enthusiastic journalists and fanboys deem the old hardware outdated and send it to the scrapyard. And, every time, they are wrong. Remember when laptops came out? Everyone thought they would spell the end of desktop PCs, yet they are still around, aren’t they? Very much […]

What are Today’s Best Blogging Platforms

Although I thought the rise of social networks would mark an end of the blogging era, the two actually complement each other quite nicely. Social networks are used to promote blog content, and social networks are present on every blog, whether it’s via comment section, or buttons on the page itself. There are a multitude […]