Phishing and scams

  • How to Remove System Tools

    New variants of rogue programs are always out there. One of these is the fake scanner, System Tool 2011. Find out how to remove System Tools in Vista or Windows 7 operating systems.
    By Donna Buenaventura March 23, 2011 

  • Effective Methods To Prevent Becoming a Phishing Scam Victim

    Phishing is a common email and internet scam, in which someone attempt to fraudulently steal another's private information. In this article, we'll explain effective methods that can help you easily detect and avoid getting caught by a phishing...
    By Regina Woodard February 28, 2011 

  • McAfee SiteAdvisor Live Review

    Here's a free SiteAdvisor Live review, from McAfee, to check out before you throw some cash in paying for subscription. You'll see how SiteAdvisor Live works in Windows and while you browse the Net.
    By Donna Buenaventura February 27, 2011 

  • How to Avoid a Fake Registry Mechanic Scam or Malware

    Have you come across an e-mail or website that sells fake registry cleaner software? Are you a victim of a Registry Mechanic scam message? You can protect yourself from becoming a victim of a scam, if you start recognizing them now.
    By Donna Buenaventura February 27, 2011 

  • Phishing Scam Information - What a Phishing Scam Looks Like

    What does a phishing scam look like? Computer users have lost in excess of $3 billion – frequently in $200 intervals – due to email scams, phishing fraud, identity theft, and other online scams. Learn how to protect yourself and...
    By Sylvia Cochran February 7, 2011 

  • ShuURL: Safe URL Redirection using Web of Trust

    ShuURL is a free online URL Redirection service that now uses Web of Trust (WOT), a popular browser add-on that will help users surf safely by avoiding malicious websites and internet security threats.
    By Donna Buenaventura February 4, 2011 

  • iPod Security - Is Yours Safe?

    We take a look at some things to consider if you're looking at an iPod Touch for your child - read inside for some valuable information.
    By Daniel Barros February 4, 2011 

  • How Phishing Works & How To Spot The Scams

    Phishing scams are becoming increasingly sophisticated and it can be difficult to tell a legitimate email from a phishing email. This article explains how phishing works and how you can easily raise your employees (and your own) awareness in order...
    By Bill Bunter February 4, 2011 

  • How To Protect Against Social Engineering Attacks

    Social engineering is the act of manipulation people into doing what you want in order to gain access to information or resources. This article will explain what you can do to protect your business against a social engineering attack.
    By Bill Bunter February 4, 2011 

  • Beware of IRS Phishing Scams this Tax Season

    Every year around tax time, crooks run phishing scams where they pose as the IRS and try to steal people's personal information by tempting them with high tax refunds of threatening an audit. Educate yourself and others so that you do not fall victim...
    By Finn Orfano February 3, 2011 
showing 21-30 of 68    < Previous  |  page: 1 2 3 4 5 ...  |  Next >