Monday, January 22, 2018

Avoid Scams

Identity Theft

Identity theft happens when someone uses your Social Security number or other personal information to open new accounts, make purchases, or get a tax...

Tech Support Scams

In a recent twist, scam artists are using the phone to try to break into your computer. They call, claiming to be computer techs...

Hacked Email

Be Smart

Protect Kids

Kids and Mobile Phones

What age is appropriate for a kid to have a mobile phone? That's something for you and your family to decide. Consider your child’s...

Protecting Your Child’s Privacy Online

As a parent, you have control over the personal information companies collect online from your kids under 13. The Children’s Online Privacy Protection Act...

Secure Computer

Securing Your Wireless Network

Today’s home network may include a wide range of wireless devices, from computers and phones, to IP Cameras, smart TVs and connected appliances. Taking...

Disposing of Your Mobile Device

Thinking of upgrading to a new mobile phone or device? Maybe returning one that didn’t work out for you? It’s important to delete any...

Computer Security

Scammers, hackers, and identity thieves are looking to steal your personal information – and your money. But there are steps you can take to...

Understanding Mobile Apps

If you have a smart phone or other mobile device, you probably use apps – to play games, get turn-by-turn directions, access news, books,...

Latest News

Cookies: Leaving a Trail on the Web

Have you ever wondered why some online ads you see are targeted to your tastes and interests, or how websites remember your preferences from...

Identity Theft

Identity theft happens when someone uses your Social Security number or other personal information to open new accounts, make purchases, or get a tax...

Kids and Mobile Phones

What age is appropriate for a kid to have a mobile phone? That's something for you and your family to decide. Consider your child’s...

Computer Security

Scammers, hackers, and identity thieves are looking to steal your personal information – and your money. But there are steps you can take to...

Protecting Your Child’s Privacy Online

As a parent, you have control over the personal information companies collect online from your kids under 13. The Children’s Online Privacy Protection Act...

Disposing of Your Mobile Device

Thinking of upgrading to a new mobile phone or device? Maybe returning one that didn’t work out for you? It’s important to delete any...

Securing Your Wireless Network

Today’s home network may include a wide range of wireless devices, from computers and phones, to IP Cameras, smart TVs and connected appliances. Taking...

Tech Support Scams

In a recent twist, scam artists are using the phone to try to break into your computer. They call, claiming to be computer techs...

Latest Articles

Cookies: Leaving a Trail on the Web

Have you ever wondered why some online ads you see are targeted to your tastes...

Tips for Using Public Wi-Fi Networks

Wi-Fi hotspots in coffee shops, libraries, airports, hotels, universities, and other public places are convenient,...

Computer Security

Scammers, hackers, and identity thieves are looking to steal your personal information – and your...

Understanding Mobile Apps

If you have a smart phone or other mobile device, you probably use apps –...

Disposing of Your Mobile Device

Thinking of upgrading to a new mobile phone or device? Maybe returning one that didn’t...