Category: How-To’s

Bitcoin Virtual Currency…Passing Fad or Worthwhile Investment?

Bitcoin Virtual Currency…Passing Fad or Worthwhile Investment?

| November 8, 2013 | 3 Replies

  Chris Dougherty VirtualThreat, Contributing Writer   Bitcoin virtual currency might be more than just a passing fad. In fact, it could be a worthwhile investment, according to experts. The virtual currency was launched in 2008 by an anonymous developer known only as ‘Satoshi Nakamoto’. The creator has since disappeared, leaving a trail of questions […]

Read More

5 Essential Online Security Tips For Your Family

5 Essential Online Security Tips For Your Family

| November 6, 2013 | 8 Replies

Chris Dougherty VirtualThreat Contributing Writer   If you are the most technical person in your neighborhood, then chances are you have become the local unofficial tech support rep for your circle of friends and family. It doesn’t matter how much, or how little, you know…as long as you are more technically capable than the rest […]

Read More

5 Mandatory Steps For Protecting Data From Eavesdroppers

5 Mandatory Steps For Protecting Data From Eavesdroppers

| March 6, 2013 | 20 Replies

Chris Dougherty VirtualThreat Contributing Writer   Every day we hear news reports in the mainstream media about social network hacking, malware, malicious account takeovers and protecting data. It doesn’t matter if you are the average Joe Blow or a huge corporation like Burger King, everyone is being targeted these days. Cyber criminals are searching for everything from […]

Read More

3 Ways Facebook Hackers Target Your Account

3 Ways Facebook Hackers Target Your Account

| January 18, 2013 | 7 Replies

Chris Dougherty Virtual Threat Contributing Writer   Facebook accounts are an often overlooked gateway into an individual’s personal life.   We, as social networking users, have few reservations about posting our photos, location, plans to travel, private outbursts, and information regarding friends, family and work.  We include names, phone numbers, email addresses, GPS coordinates and […]

Read More

Evade Government Surveillance Stay Anonymous Online

Evade Government Surveillance Stay Anonymous Online

| January 3, 2013 | 9 Replies

  Chris Dougherty VirtualThreat Contributing Writer   Why stay anonymous online?  In today’s society there are people and automated devices that are recording your deepest, most private thoughts and activities. Each day we voluntarily divulge the most intimate details of our lives through social networking accounts, email, banking apps, online games and more. In addition, […]

Read More

What To Do When Your Phone Gets Hacked

What To Do When Your Phone Gets Hacked

| November 19, 2012 | 4 Replies

Elise Ackerman Forbes   What To Do When Your Phone Gets Hacked … My friend Mike’s Android phone had been acting strangely for awhile. In the middle of the night, the phone would come alive. It would meander down various menu paths, send texts that were gibberish and start playing poker. Was it bug in […]

Read More

5 Tips for Protecting Your Identity

5 Tips for Protecting Your Identity

| October 28, 2012 | 3 Replies

  Mark Walker VirtualThreat Guest Writer   Protecting your identity is important. Once your identity is stolen, it can be difficult to restore. After theft, you may find that you have multiple credit cards and loans under your name, property that you do not own or other financial obligations that you simply did not make. […]

Read More

How-To: Dionaea Honeypot Installation on Joyent Cloud VM

How-To: Dionaea Honeypot Installation on Joyent Cloud VM

| October 24, 2012 | 3 Replies

Eric Gearhart Virtual Threat Contributing Writer   In this “Virtual Threat” how-to article, I’ll discuss the ins and outs of setting up a Dionaea honeypot. For those unfamiliar with the term, a honeypot at its core is a “computer system expressly set up to attract and ‘trap’ people who attempt to penetrate other people’s computer […]

Read More

How to Survive a Zombie Hack Attack

How to Survive a Zombie Hack Attack

| July 6, 2012 | 3 Replies

Stephanie McGrath The Chronicle Herald   How to Survive a Zombie Hack Attack I was sitting at my parents’ cottage checking my iPhone when digital disaster struck. First, I couldn’t sign into my email. Next, my husband’s phone made that annoying “You’ve got mail” Apple sound. “Did you just send me an email?” he asked. […]

Read More