worst data leak cases

Hacked Companies: Inside the Largest Data Leak Cases of 2017

From popular dating sites to major retailers, threats to your cybersecurity and sensitive data are everywhere. If you think you’re immune just because you’re a larger company, think again. Read on to learn more about the biggest data leak incidents of 2017. Saks Fifth Avenue This March, popular department store Saks Fifth Avenue experienced a massive data leak that […]

tinder and match.com scams

Match.com Scams: Security Tips for Dating Sites & Apps

Avoid scammers & protect your privacy on dating sites like match.com: Are you thinking of trying out an online dating site? Millions of people now have profiles on Match.com, Tinder, Bumble, and Plenty of Fish, and online dating is now a multi-billion dollar business. But wait, before you go ahead and set up your dating profile, there are some things […]

shared ip address seo harm

Yahoo & Bing Dropped Your Website? The Dirty Truth About Shared Hosting

One day I noticed that my site wasn’t showing up on Yahoo when I searched for “Chairman Meow.” I knew that was a red flag, so I tried a few more search terms. Still nothing. Then, I checked my other sites under the same account. All of them missing. It didn’t take me long to […]

carbonite plans pricing

Carbonite Costs, New Cloud Backup Prices

How much does Carbonite cost? It’s easy to figure out the cost of Carbonite cloud backup. Their plans for Home or Office have 3 levels each, so you can determine which plan is best for your needs, and how much it costs. In general, their 2-3 year subscriptions cost 10% less, and using a coupon can save you 10% on […]

creepware security online

New Creepware Threat: Security Software Protects Your Computer

New Security Threat: Remote Access Trojans, aka “Creepware” – (Please share this!) As if there weren’t enough potential security threats against your Mac or PC computer, a new spyware virus called, “creepware,” has emerged. Why should you care about creepware? It literally gives hackers full remote access and control of your computer, without you knowing. It can quickly get installed when […]