Computer Security Threats

Computer security threats are relentlessly inventive. Masters of disguise and manipulation, these threats constantly evolve to find new ways to annoy, steal and harm. Arm yourself with information and resources to safeguard against complex and growing computer security threats and stay safe online.

Computer Virus Threats

Perhaps the most well known computer security threat, a computer virus is a program written to alter the way a computer operates, without the permission or knowledge of the user. A virus replicates and executes itself, usually doing damage to your computer in the process. Learn how to combat computer virus threats and stay safe online.

Spyware Threats

A serious computer security threat, spyware is any program that monitors your online activities or installs programs without your consent for profit or to capture personal information. We’ve amassed a wealth of knowledge that will help you combat spyware threats and stay safe online.

Hackers & Predators

People, not computers, create computer security threats and malware. Hackers and predators are programmers who victimize others for their own gain by breaking into computer systems to steal, change or destroy information as a form of cyber-terrorism. What scams are they using lately? Learn how to combat dangerous malware and stay safe online.

Phishing Threats

Masquerading as a trustworthy person or business, phishers attempt to steal sensitive financial or personal information through fraudulent email or instant messages. How can you tell the difference between a legitimate message and a phishing scam? Educate yourself on the latest tricks and scams.

CONSUMER ARTICLES

Digital Family Life
2012 Olympics Apps
4 Ways To Backup Music
5 Weather Apps
9 New Years Apps
Apps for Baseball
Best Movie Apps
Buy Baby Domain Name
Children, Sleep & Technology
Facebook Parenting
Father’s Day Gift Guide
Foodie Mania
Free Mobile Apps
Gamification and Sports
Get in Shape
Graduation Gift Ideas
Lose Your Smartphone or Tablet
Mobile Apps & Natural Disasters
Mobile Device at the Ballpark
Music in The Cloud
Parent's Guide to Online Safety
Phishing Scams
Sci-Fi/Fantasy Sites
Social Media & School - #1
Social Media & School - #2
Social Media & School - #3
Social Networking
Summer Vacation
Summer Vacation & Tech Usage
Tech Savvy Teens
Technology & Music
Technostalgia
The Next Top Chef
Three Back-To-School Scams
Toddlers and Tablets
Tumblr Food Sites
Will Tablets Replace Laptops?
Wine & Mixology Sites
Mobile Security
3D Technology for Mobile
5 Phone Hacking Stories
7 Internet Security Lies
Best Apps for Vacation
Geolocation Services
Mobile Security Questions
Payment Technology
Prevent Phone Hacking
Smartphone & Tablet Security
Solar Powered Devices
Tax Refunds and Mobile
Voice Recognition & Security Threats
PC Security
5 Infographics
Computer Hackers & Predators
Computer Security Glossary
Computer Security Threats
Computer Virus Information
Credit Card Fraud
Email and Instant Message Activity
File Loss and Data Corruption
File Sharing and Downloads
Internet Browsing Safely
Internet Dangers
Internet Security FAQ
Interruptions from Popups & Spam
Malware Symptoms and Threats
Online Fraud Prevention
Online Identity Theft
PC Performance Problems
Phishing Scams
Prevent Malware Popups and Scams
Unexplained PC Behavior
You Are What You Google
Online Shopping & Banking
Banking Trends
Cool Music Apps
Credit Card Information
Credit Card Protection
Holiday Shopping Infographic
Holiday Shopping Tips
Mobile Fashionista
Top Music Sites
Digital Citizenship
Can Technology Save Lives?
Digital Grassroot Activism
Tech & Developing Countries
Cyberbullying & Online Predators
Cybercrime
Online Activities
Your Child's Online Reputation
Managing your Online Reputation
Digital Communication Style
Job Hunt Identity
Social Networks & Privacy
Sure Footed Social Networking
Wipe Your Device