How-To’s

2 Simple Tools To See If Your Google Account is Hacked

Has Your Google Account Been Hacked?

  Chris Dougherty VirtualThreat, Contributing Writer   Simple Tools To See If Your Google Account is Hacked A recent string of high-profile attacks, including the breach against Yahoo Mail servers, has been the focus of technology media outlets over the past few weeks. It appears that no cloud-based service is safe from malicious hackers these days. Google’s Gmail is another …

Read More »

Bitcoin Virtual Currency…Passing Fad or Worthwhile Investment?

Bitcoin Virtual Currency...Passing Fad or Worthwhile Investment?

  Chris Dougherty VirtualThreat, Contributing Writer   Bitcoin virtual currency might be more than just a passing fad. In fact, it could be a worthwhile investment, according to experts. The virtual currency was launched in 2008 by an anonymous developer known only as ‘Satoshi Nakamoto’. The creator has since disappeared, leaving a trail of questions about his identity and motives. …

Read More »

5 Essential Online Security Tips For Your Family

5 Essential Online Security Precautions For Your Family

Chris Dougherty VirtualThreat Contributing Writer   If you are the most technical person in your neighborhood, then chances are you have become the local unofficial tech support rep for your circle of friends and family. It doesn’t matter how much, or how little, you know…as long as you are more technically capable than the rest of your family, you will …

Read More »

5 Mandatory Steps For Protecting Data From Eavesdroppers

5 Mandatory Steps For Keeping Data Safe

Chris Dougherty VirtualThreat Contributing Writer   Every day we hear news reports in the mainstream media about social network hacking, malware, malicious account takeovers and protecting data. It doesn’t matter if you are the average Joe Blow or a huge corporation like Burger King, everyone is being targeted these days. Cyber criminals are searching for everything from your banking and financial info …

Read More »

3 Ways Facebook Hackers Target Your Account

Chris Dougherty Virtual Threat Contributing Writer   Facebook accounts are an often overlooked gateway into an individual’s personal life.   We, as social networking users, have few reservations about posting our photos, location, plans to travel, private outbursts, and information regarding friends, family and work.  We include names, phone numbers, email addresses, GPS coordinates and the list goes on and …

Read More »

Evade Government Surveillance Stay Anonymous Online

Evade Government Censorship and Remain Anonymous Online

  Chris Dougherty VirtualThreat Contributing Writer   Why stay anonymous online?  In today’s society there are people and automated devices that are recording your deepest, most private thoughts and activities. Each day we voluntarily divulge the most intimate details of our lives through social networking accounts, email, banking apps, online games and more. In addition, governments and corporations can censor …

Read More »

What To Do When Your Phone Gets Hacked

What To Do When Your Phone Gets Hacked

Elise Ackerman Forbes   What To Do When Your Phone Gets Hacked … My friend Mike’s Android phone had been acting strangely for awhile. In the middle of the night, the phone would come alive. It would meander down various menu paths, send texts that were gibberish and start playing poker. Was it bug in the operating system? Or had …

Read More »

5 Tips for Protecting Your Identity

5 Tips for Protecting Your Identity

  Mark Walker VirtualThreat Guest Writer   Protecting your identity is important. Once your identity is stolen, it can be difficult to restore. After theft, you may find that you have multiple credit cards and loans under your name, property that you do not own or other financial obligations that you simply did not make. When you want to protect …

Read More »

How-To: Dionaea Honeypot Installation on Joyent Cloud VM

Dionaea Honeypot

Eric Gearhart Virtual Threat Contributing Writer   In this “Virtual Threat” how-to article, I’ll discuss the ins and outs of setting up a Dionaea honeypot. For those unfamiliar with the term, a honeypot at its core is a “computer system expressly set up to attract and ‘trap’ people who attempt to penetrate other people’s computer systems.” A boatload of pre-built …

Read More »

How to Survive a Zombie Hack Attack

How to Survive a Zombie Hack Attack

Stephanie McGrath The Chronicle Herald   How to Survive a Zombie Hack Attack I was sitting at my parents’ cottage checking my iPhone when digital disaster struck. First, I couldn’t sign into my email. Next, my husband’s phone made that annoying “You’ve got mail” Apple sound. “Did you just send me an email?” he asked. “No,” I said. (I’d been …

Read More »