Burger King hasn't been "having their way" (Get it? Get it?) over the past few days, as hackers have a heyday with the fast food giant's Twitter account. Hackers gained control over the @BugerKing twitter account and rebranded it to appear as McDonalds, complete with the Golden Arches logo in the avatar. Then, hilarity ensued.Last modified on Continue reading
Last time, we spoke about password security, we went over the importance of using strong passwords to avoid identity theft. In part two, we will discuss three easy password solutions that can help you manage all of your different passwords.Last modified on Continue reading
For sites you need to log into often, having your browser remember your password can save you time logging in, especially if you are using secure passwords that you might need to look up otherwise. There are circumstances where you might want to manage what personal information gets stored in your web browser.Last modified on Continue reading
LinkedIn, the popular social network geared towards business networking and communication, has reported a major breach in security. A file containing over six million passwords was leaked and posted on the Internet.
What does this mean for you, and what course of action should you take?
The problem with carrying around an expensive, portable piece of equipment is that it's possible for someone to pick it up and run with it. According to LoJack, a security firm that focuses on stolen property, two million laptops are stolen each year. What should you do if you are a victim of laptop theft?Last modified on Continue reading