Sunday, April 22, 2018

Avoid Scams

Hacked Email

You get a flood of messages from friends and family. They’re getting emails from you with seemingly random links, or messages with urgent pleas...

Tech Support Scams

In a recent twist, scam artists are using the phone to try to break into your computer. They call, claiming to be computer techs...

Identity Theft

Be Smart

Protect Kids

Protecting Your Child’s Privacy Online

As a parent, you have control over the personal information companies collect online from your kids under 13. The Children’s Online Privacy Protection Act...

Kids and Mobile Phones

What age is appropriate for a kid to have a mobile phone? That's something for you and your family to decide. Consider your child’s...

Secure Computer

Disposing of Your Mobile Device

Thinking of upgrading to a new mobile phone or device? Maybe returning one that didn’t work out for you? It’s important to delete any...

Computer Security

Scammers, hackers, and identity thieves are looking to steal your personal information – and your money. But there are steps you can take to...

Securing Your Wireless Network

Today’s home network may include a wide range of wireless devices, from computers and phones, to IP Cameras, smart TVs and connected appliances. Taking...

Understanding Mobile Apps

If you have a smart phone or other mobile device, you probably use apps – to play games, get turn-by-turn directions, access news, books,...

Latest News

Securing Your Wireless Network

Today’s home network may include a wide range of wireless devices, from computers and phones, to IP Cameras, smart TVs and connected appliances. Taking...

Computer Security

Scammers, hackers, and identity thieves are looking to steal your personal information – and your money. But there are steps you can take to...

Kids and Mobile Phones

What age is appropriate for a kid to have a mobile phone? That's something for you and your family to decide. Consider your child’s...

Protecting Your Child’s Privacy Online

As a parent, you have control over the personal information companies collect online from your kids under 13. The Children’s Online Privacy Protection Act...

Tech Support Scams

In a recent twist, scam artists are using the phone to try to break into your computer. They call, claiming to be computer techs...

Identity Theft

Identity theft happens when someone uses your Social Security number or other personal information to open new accounts, make purchases, or get a tax...

Understanding Mobile Apps

If you have a smart phone or other mobile device, you probably use apps – to play games, get turn-by-turn directions, access news, books,...

Hacked Email

You get a flood of messages from friends and family. They’re getting emails from you with seemingly random links, or messages with urgent pleas...

Latest Articles

Cookies: Leaving a Trail on the Web

Have you ever wondered why some online ads you see are targeted to your tastes...

Tips for Using Public Wi-Fi Networks

Wi-Fi hotspots in coffee shops, libraries, airports, hotels, universities, and other public places are convenient,...

Computer Security

Scammers, hackers, and identity thieves are looking to steal your personal information – and your...

Understanding Mobile Apps

If you have a smart phone or other mobile device, you probably use apps –...

Disposing of Your Mobile Device

Thinking of upgrading to a new mobile phone or device? Maybe returning one that didn’t...