Best internet security tips and tricks

Attacks and Threats

Understanding Denial-of-Service Attacks
Understanding Hidden Threats: Corrupted Software Files
Understanding Hidden Threats: Rootkits and Botnets
Recognizing Fake Antiviruses
Avoiding the Pitfalls of Online Trading
Avoiding Social Engineering and Phishing Attacks
Dealing with Cyberbullies
Identifying Hoaxes and Urban Legends
Preventing and Responding to Identity Theft
Recognizing and Avoiding Spyware
Recovering from Viruses, Worms, and Trojan Horses
Handling Destructive Malware

Email and Communication

Using Instant Messaging and Chat Rooms Safely
Benefits of BCC
Benefits and Risks of Free Email Services
Reducing Spam
Staying Safe on Social Network Sites
Understanding Digital Signatures
Understanding Your Computer: Email Clients
Using Caution with Email Attachments

General Information

Why is Cyber Security a Problem?
Understanding ISPs
Guidelines for Publishing Information Online

General Security

Sochi 2014 Olympic Games
Understanding Anti-Virus Software
Understanding Firewalls
Choosing and Protecting Passwords
Coordinating Virus and Spyware Defense
Debunking Some Common Myths
Good Security Habits
Keeping Children Safe Online
Real-World Warnings Keep You Safe Online
International Mobile Safety Tips
Safeguarding Your Data

Mobile Devices

Cybersecurity for Electronic Devices
Defending Cell Phones and PDAs Against Attack
Holiday Traveling with Personal Internet-Enabled Devices
Protecting Portable Devices: Data Security
Protecting Portable Devices: Physical Security
Securing Wireless Networks
Using Caution with USB Drives

Privacy

Supplementing Passwords
Understanding Encryption
Effectively Erasing Files
How Anonymous Are You?
Protecting Your Privacy

Safe Browsing

Understanding Your Computer: Web Browsers.
Understanding Internationalized Domain Names.
Avoiding Copyright Infringement.
Understanding Web Site Certificates.
Understanding Your Computer: Web Browsers.
Browsing Safely: Understanding Active Content and Cookies.
Evaluating Your Web Browser's Security Settings.
Shopping Safely Online.
Understanding Bluetooth Technology.

Software and Applications

Reviewing End-User License Agreements
Risks of File-Sharing Technology
Understanding Patches
Understanding Voice over Internet Protocol (VoIP)
Understanding Your Computer: Operating Systems

Post a Comment

0 Comments