ST06-005: Dealing with Cyberbullies
Original release date: June 01, 2011 | Last revised: February 06, 2013 Bullies are taking advantage of technology to intimidate and harass their victims. Dealing with cyberbullying can be difficult,...
View ArticleST04-014: Avoiding Social Engineering and Phishing Attacks
Original release date: October 22, 2009 | Last revised: February 06, 2013 Do not give sensitive information to anyone unless you are sure that they are indeed who they claim to be and that they should...
View ArticleST06-004: Avoiding the Pitfalls of Online Trading
Original release date: April 07, 2011 | Last revised: February 06, 2013 Online trading can be an easy, cost-effective way to manage investments. However, online investors are often targets of scams,...
View ArticleST10-001: Recognizing Fake Antiviruses
Original release date: October 11, 2010 | Last revised: February 06, 2013 Fake antivirus is malicious software (malware) designed to steal information from unsuspecting users by mimicking legitimate...
View ArticleST06-001: Understanding Hidden Threats: Rootkits and Botnets
Original release date: August 24, 2011 | Last revised: February 06, 2013 Attackers are continually finding new ways to access computer systems. The use of hidden methods such as rootkits and botnets...
View ArticleST06-006: Understanding Hidden Threats: Corrupted Software Files
Original release date: March 09, 2011 | Last revised: February 06, 2013 Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you...
View ArticleST04-015: Understanding Denial-of-Service Attacks
Original release date: November 04, 2009 | Last revised: February 06, 2013 What is a denial-of-service (DoS) attack?In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate...
View ArticleST05-006: Recovering from Viruses, Worms, and Trojan Horses
Original release date: March 19, 2008 | Last revised: February 06, 2013 Unfortunately, many users are victims of viruses, worms, or Trojan horses. If your computer gets infected with malicious code,...
View ArticleST04-016: Recognizing and Avoiding Spyware
Original release date: November 19, 2009 | Last revised: February 06, 2013 Because of its popularity, the internet has become an ideal target for advertising. As a result, spyware, or adware, has...
View ArticleST05-019: Preventing and Responding to Identity Theft
Original release date: September 17, 2008 | Last revised: February 06, 2013 Identity theft, or identity fraud, is a crime that can have substantial financial and emotional consequences. Take...
View ArticleST04-009: Identifying Hoaxes and Urban Legends
Original release date: March 10, 2011 | Last revised: February 06, 2013 Chain letters are familiar to anyone with an email account, whether they are sent by strangers or well-intentioned friends or...
View ArticleST10-001: Recognizing Fake Antiviruses
Original release date: October 11, 2010 | Last revised: February 06, 2013 Fake antivirus is malicious software (malware) designed to steal information from unsuspecting users by mimicking legitimate...
View ArticleST05-006: Recovering from Viruses, Worms, and Trojan Horses
Original release date: March 19, 2008 | Last revised: February 06, 2013 Unfortunately, many users are victims of viruses, worms, or Trojan horses. If your computer gets infected with malicious code,...
View ArticleST06-006: Understanding Hidden Threats: Corrupted Software Files
Original release date: March 09, 2011 | Last revised: February 06, 2013 Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you...
View ArticleST04-009: Identifying Hoaxes and Urban Legends
Original release date: March 10, 2011 | Last revised: February 06, 2013 Chain letters are familiar to anyone with an email account, whether they are sent by strangers or well-intentioned friends or...
View ArticleST05-006: Recovering from Viruses, Worms, and Trojan Horses
Original release date: March 19, 2008 | Last revised: February 06, 2013 Unfortunately, many users are victims of viruses, worms, or Trojan horses. If your computer gets infected with malicious code,...
View ArticleST06-005: Dealing with Cyberbullies
Original release date: June 01, 2011 | Last revised: February 06, 2013 Bullies are taking advantage of technology to intimidate and harass their victims. Dealing with cyberbullying can be difficult,...
View ArticleST06-006: Understanding Hidden Threats: Corrupted Software Files
Original release date: March 09, 2011 | Last revised: February 06, 2013 Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you...
View ArticleST10-001: Recognizing Fake Antiviruses
Original release date: October 11, 2010 | Last revised: February 06, 2013 Fake antivirus is malicious software (malware) designed to steal information from unsuspecting users by mimicking legitimate...
View ArticleST05-006: Recovering from Viruses, Worms, and Trojan Horses
Original release date: March 19, 2008 | Last revised: February 06, 2013 Unfortunately, many users are victims of viruses, worms, or Trojan horses. If your computer gets infected with malicious code,...
View Article
More Pages to Explore .....