Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Monday, June 29, 2015
How to Spot and Avoid Fake Online Charity / Disaster Aid Scams
Are there really people out there that would take advantage of human tragedies in order to scam people out of money? Unfortunately, the answer is "yes". Let's learn how to spot and avoid fake online charities:
Are you afraid of your co-workers or others connecting to your portable wireless hotspot, using all your data, piling up overages, and leaving you holding the bill? Let's look at a few steps you can take to help prevent this from happening: