Privacy & Security


A robot network consisting of thousands or millions of computers linked together to create tremendous amounts of computing power, ready to do their evil master’s bidding with just one click.  It may sound like the plot of the latest sci-fi thriller, but this is 100% non-fiction!


Computer or HTTP cookies are basically little packets of information saved on your computer by the websites you visit.  While some cookies expire when you leave a website or at the end of your internet session, others,...


Malicious hackers, aka “crackers” or “black hats,” break into computer networks, spread viruses and other types of malware, steal confidential information, and commit other kinds of cybercrime.

Identity Theft

What do Tiger Woods, Oprah Winfrey, Steven Spielberg, Warren Buffet, and 9 million ordinary Americans have in common?  They have all been the victims of identity theft.  Identity theft and identity fraud represent the scariest and fastest growing threat...

Junk Mail

With landfills overfilling and the rise of both the internet and the green movement, it’s amazing how much unsolicited mail still arrives in mailboxes on a daily basis.


Malware is a general term that refers to all “malicious software,” including viruses, spyware, scareware, Trojan horses, worms, and the like.  Basically bad stuff that you DO NOT want on your computer.


Sending thousands or millions of e-mails takes little effort and costs spammers almost nothing.  The cost to consumers, however, is huge; not just in the time it takes us to wade through the sea of spam, but also in the risk posed by deceptive advertising...


Don’t let yourself become a target of deceptive telemarketing calls. When you get that annoying call right in the middle of dinner, your first instinct is to hang up, right?  We’re here to tell you – DON’T DO IT!!!

Wi-Fi Hot Spots

A Wi-Fi hotspot allows you to access the internet through a shared wireless network. However, using an unsecured wireless network can leave your computer and the information you are transmitting vulnerable to hackers and identity thieves.

Back to Top ↑