Blog

Category: Security

General, Security

New Microsoft Excel Exploit

Feb 5, 2007

Microsoft confirmed via TechNet that there is a new Excel zero-day exploit making limited appearances. This vulnerability affects Microsoft Office 200...

Are You Kiddin' Me?, Security

VA Hard Drive Missing

Feb 3, 2007

When I first read this, I thought is was old news. However, upon further examination, it is a NEW report. Department of Veterans Affairs is reporting ...

Security

Identity Thief Sentenced

Jan 31, 2007

A New York Court sentenced 32 year old Nigerian Lanre Elekede to 34 months in prison for his role in an identity-theft scheme. Elekede was convicted o...

Security

Secure Your Wireless Router

Jan 29, 2007

We have posted on this a couple of times in the past, but it bears repeating: Make sure that your wireless router is secured! Wireless routers are bec...

Security

TJ Maxx Database Hack Putting New Englanders in Danger

Jan 26, 2007

The TJ Maxx database hack carried out against Framingham, Massachusetts based TJX Companies Inc. could put as many as 30% of New Englanders in danger ...

Security

What To Do if You Suspect Identity Theft: Step Four

Jan 25, 2007

If you ask a victim of identity theft (and their numbers are growing), there is really no easy way to deal with the intrusion. Many of them say the fe...

Are You Kiddin' Me?, General, Security

What are the Chances?

Jan 25, 2007

I have been called “paranoid” when it comes to computer security. Usually, it is after I have refused to send some sensitive data via emai...

Security

What To Do if You Suspect Identity Theft: Step Three

Jan 24, 2007

There are four main steps that you should take. Let’s recap what we have so far: The first step was to contact a credit reporting agency and not...

Security

What To Do if You Suspect Identity Theft: Step Two

Jan 23, 2007

There are four main steps that you should take if you think you are the victim of identity theft. The first step was to contact a credit reporting age...

Security

What To Do First if You Suspect Identity Theft

Jan 22, 2007

If you suspect your identity may have been stolen, what do you do next? Who do you call or contact? There are specific steps to take if you are ever i...

General, Security, Tech Tips, Technology

Recycle Your Old Electronics

Jan 22, 2007

How many old computer monitors do you have? What about old PCs, the ones that are way to slow to be of any use, but still have some data that you don&...

Security

Hackers Break Into T.J. Maxx Database

Jan 18, 2007

T.J. Maxx has reported the they have been hacked. “I don’t shop at T.J. Maxx”, you say? Well, they also operate as Marshalls, HomeGo...

arrow

Go to our blog