Customize the AutoCorrect Feature in Microsoft Office Apps to Save Time

The AutoCorrect feature in Microsoft Word, Excel, and other Office apps is handy because it automatically fixes and formats text as you type it. However, it might make changes that you do not want. Find out how to customize this feature so it behaves like you want it to.

Former Employees Can Pose a Big Threat to Your Data

Data breaches by former employees do not gain as much media exposure as those caused by cybercriminals. However, these insider attacks can pose a significant threat to companies’ data as well as their bottom line, as the following examples demonstrate: Over a two-year period, the co-owner of an engineering firm accessed the servers of his former employer (also an engineering …

Antivirus vs. Anti Malware: Which One Should You Choose?

People should be safe on the Internet, but reality shows us something else. Malware attacks are on the rise, and we need software programs to keep our devices secure. Cyber criminals became more skilled, organized and persistent in their spam campaigns. They use new tactics, such as auto updating links in malicious emails, or new extensions to exploit flaws in …

Fake Banking Wesites that Look Like the Real Deal

Cybercriminals Are Creating Fake Banking Websites That Look Like the Real Deal The Trickbot banking trojan is sending its victims to fake bank websites that are identical to the victims’ real bank sites. Learn how this malware works and how to avoid becoming its next victim. Banking trojans have been around for years. If your computer is infected, the trojan …

Why It’s Still a Bad Idea to Post or Trash Your Airline Boarding Pass

An October 2015 piece published here about the potential dangers of tossing out or posting online your airline boarding pass remains one of the most-read stories on this site. One reason may be that the advice remains timely and relevant: A talk recently given at a Czech security conference advances that research and offers several reminders of how being careless …

Are Your IT Systems Prepared for Severe Weather?

Severe weather can be as devastating to your IT environment as cyberattacks. While you cannot prevent or stop events like tornados and hurricanes, you can prepare for them. With the correct preparations, you can minimize the damage to your IT systems and lessen downtime if disaster strikes. Here are five ways you can prepare your IT systems for severe weather: …

Don’t Do This When Cleaning Your Device’s Touchscreen

The touchscreens on smartphones, tablets, and other mobile devices are made to be touched, so getting fingerprints, smudges, and other types of dirt on them is inevitable, but it is important to not let this dirt accumulate over time. Build up can interfere with a screen’s touch sensitivity as well as make it harder for you to see what is …

What Happens After A Hacker Steals Your Password

You are probably familiar with how cybercriminals use phishing and other types of attacks to obtain employees’ passwords, as this is often discussed in the media. But do you know what happens after a hacker steals an employee’s password? To answer this question, researchers at the security firm Bitglass conducted aneye-opening experiment. The Experiment The researchers built a functional web …

If Your Mobile Phone Has Stopped Working, You May Be Hacked

Our friends over at The Register recently documented yet another real-world example of a cybercrime known as SIM swapping. In its most up-front form, here’s the sort of thing that happens. A crook walks into a mobile phone shop, lets himself get talked into a top-of-the-range new mobile phone to replace the one he says he just lost. Fell out of his pocket …