Speeding Ticket Scam

The Police Department of Tredyffrin PA announced the discovery of a speeding ticket scam. Victims received emails with the following content: From: Speeding Citation (citation@safe-browsing.com) To: vfiorillo@phillymag.com Subject: Notification of excess speed First Name: Victor Last Name: Fiorillo Notification of excess speed Route: Mill Road Date: 8 March 2016 Time: 7:55 am Speed Limit: 40…

Free Protection Form Ransomware

Ransomware attacks have been growing exponentially making anti-virus companies scramble to keep up with the latest attacks.  One of these companies, Bitdefender, takes a new tactic and makes it available for FREE. The Bitdefender solution makes it appear as though your computer is already infected with current versions of Ransomware. Kind of like a vaccine…

The Danger of Chat Clients

Chat clients are another point of entry into your computer you need to protect. An instant messaging network is made up of clients and servers. The client is a software application that can run off of a desktop computer, laptop computer, tablet, smartphone or any computing device. A user installs the chat application onto their…

Make Your Bluetooth Safe

For a criminal to break into a Bluetooth device, they must force two paired Bluetooth devices to break their connection, known as Blueballing. For instance the connection between a cellular phone and a Bluetooth enabled headset could be broken allowing the cell phone to be hijacked. One method used to send unwanted files is Bluejacking.…

Use Firewalls

Do not operate computers without using firewalls. A firewall protects a computer, or network, through a series of access control policies separating that computer, or network, from other computers, or networks. There are two types of firewalls: Software firewall – software running on an individual computer Hardware firewall – a dedicated device designed to protect…

Get Antivirus Software

Get antivirus software. Having software to protect your computer against malicious code is a must. There are a lot of antivirus software products on the market. Each company takes a different approach with different methods and implementations of combatting threats. One thing they all do is search the files on your computer by comparing those…

Secure Your Wireless Access Point

Secure your wireless access points. Unsecure wireless access points are the most common vulnerability most home and small business networks have. Very often consumers purchase a wireless access point, either stand alone or integrated into a firewall, plug it in and connect with no configuration. They use the default manufacturer settings. This is a disaster…