Cyberbullying- Prevention and Reporting

Cyberbullying is bullying that takes place using electronic technology, and it’s increasing every day.  Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites. Examples of cyberbullying include mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles.

There is no better time than now  to prevent and report this disturbing trend.

Continue Reading…

0Shares

6 Ways Hackers Crack Your Password

If your bank account or online accounts like Gmail, Yahoo, Facebook or Twitter has ever been hacked, you should know that the cyber criminals use specific trick to get into your account. With passwords being the central theme of almost all your accounts, hackers prefer to go after your password to hack into your financial as well as online accounts.

If your account is hacked, the criminals probably used one of the 6 below given ways to crack your account. If you study these methods you can prepare yourself better to repel such hacks and control your accounts easily.

Continue Reading…

0Shares

LuckyPet Data Breach Compromises Online Payment Info

Seattle-based pet store LuckyPet notified the California State Attorney General’s office of a data breach that compromised online customer information.  LuckyPet said it has not received any reports of actual misuse of any credit cards as a result of the incident and recommended that customers monitor their accounts for fraudulent activity.

Continue Reading…

0Shares

7 Million Impacted by Lifeboat Minecraft Community Breach

On Tuesday, security researcher Troy Hunt revealed on Twitter that the millions of accounts were exposed in January, and that he was uploading the data on his website, so that users could check to see if they were exposed in the breach. As usual, the data on his website comes from website breaches which have been made publicly available.

Continue Reading…

0Shares

How Strangers Can Hack the Phone in Your Pocket

In today’s world, there’s really only two types of companies or two types of people which are those who have been hacked and realize it and those who have been hacked and haven’t.” That’s what mobile security expert John Hering tells 60 Minutes correspondent Sharyn Alfonsi about the danger of cellphone hacking on this week’s broadcast.

Continue Reading…

0Shares