Evan is a writer with over a decade of digital publishing experience. He also builds blogs, loves gadgets, and fixes tech problems around the house.
Articles by Evan Porter
Contracting a computer virus can be devastating to the data on your PC or mobile device. Passwords stolen, bank accounts hacked, and personal, private info locked and held for ransom by hackers – these are just some of the problems you’ll face after your computer has been targeted. So how can you ensure total protection against cyber infection?
The best way is to install trusted antivirus software on your PC and devices; but with so many different choices, from free to premium services, how can you know which one is right for you?
This guide to antivirus software will answer these questions and save you the time and money in researching and testing, so that you can make the best decision when it comes to protecting your most valuable data.
You’re probably used to getting plenty of junk mail delivered to your physical mailbox.
Fliers you don’t want, coupons you don’t need, and endless catalogs show up on a daily basis.
In the last thirty years or so, as the Internet and email have become more prominent, spammers have realized that it’s often cheaper and more effective to peddle their wares online.
We’re all familiar with how hackers are displayed in movies. Brooding criminals in hoodies, frantically hammering lines of code into a computer in order to break through complex security systems.
We know that, in real life, too, hackers are a major threat to our safety.
But what exactly is hacking?
In The Aeneid, the story of the Trojan War, a group of Greek soldiers hide inside a massive wooden horse as the rest of their army sails away. The Trojan army, thinking the horse to be a gift of surrender, brings the structure inside their high walls during the celebration.
Once inside, the Greek soldiers climb out for a devastating sneak attack.
The Internet has opened up unlimited possibilities for us to consume information and connect with the rest of the world.
Unfortunately, it’s also opened up plenty of back doors for criminals.
Cybercrime is a relatively new phenomenon, and it refers to any crime carried out by someone using a computer or electronic device, especially over the Internet.
While some hackers use stealth methods like infecting your computer with malware to steal your most valuable info, others simply ask for it up front. This practice is called “phishing” and it’s one of the most effective methods for duping unsuspecting victims.
Phishing is a type of cybercrime that enables hackers to pose as authority figures, customer service representatives, or other trusted sources, in order to steal your most valuable personal information.
There are dozens of different kinds of malware and viruses, each being dangerous in their own way.
Some of them force suspicious ads into your web browser, others steal your personal information, and others silently run in the background without you ever knowing.
While most popular operating systems are designed to keep the data on your computer secure, the people who design these systems sometimes make tiny errors that may go completely unnoticed by most users, and may leave you and your PC open to a cyber attacks.
With each of us having so many online accounts, so many pieces of personal data drifting through cyberspace, and so much personal info freely available on social media, it’s never been easier for hackers to impersonate another person.
Identity theft is any instance where a criminal steals and uses some aspect of your personal identity (like your social security number, name, driver’s license number, or other personally identifying info) to commit fraud — usually for financial gain.
There are dozens of different kinds of malware: viruses, Trojans, bots, ransomware, and plenty more. All of them can wreak absolute havoc on your computer if you’re not protected.
One of the most nefarious of the bunch is the class of malware known as computer worms.