A slow computer can be both frustrating and time consuming, so weâve provided a few basic tips to help give your computer its speed back.
The post How to speed up your computer appeared first on We Live Security.
A slow computer can be both frustrating and time consuming, so weâve provided a few basic tips to help give your computer its speed back.
The post How to speed up your computer appeared first on We Live Security.
Securing your PC isn’t as complex as it first appears. Here’s five tips to help keep your documents safe and threats at bay.
The post Top 5 tips for securing your PC appeared first on We Live Security.
Well, itâs happened again. Another security breach, more embarrassing photos and films leaked all over the Web. Throw in privacy issues and possible child pornography charges and Cyber Security Awareness Month is getting off to a really bad startâ¦or at least, to put a more positive spin on it, hopefully making people more aware.
âSnappening,â as its been called, which was revealed over the past weekend, is a breach involving users of a web site called SnapSaved.com and consists of approx. 90,000 photoâs and 9,000 videos  shared by as many as 200,000 Snapchat users.
SnapSaved.com, as you can probably tell by the description is a web service that allowed users to covertly save incoming message. The service did this by using your login credentials to access Snapchatâs servers and then store the images permanently on the SnapSaved servers.
Hackers managed to access the SnapSaved.com web site and steal the content that users had been storing there. While most of the content is reported to be of every day life there is of course some content that is more personal and inappropriate for viewing by anyone that it was not specifically meant for.
Itâs important to understand that the hack was not on Snapchatâs servers.
Itâs important to understand that the hack was not on Snapchatâs servers. Snapchat has built a growing and loyal user base on the promise that anything sent over its network disappears after a set period of time, typically a matter of seconds. This obviously promotes users sending material they would not send over other services and can possibly lead to people being a little more daring than they should be. You can read Snapchatâs reaction to these issues here.
The breach brings home the message that whatever you post online may well end up online forever and could be seen by people that it was not intended for. In fact recently we highlighted the potential issues that Snapchat users may have if someone decides to take a copy of something that was not intended to live beyond a few seconds. You can view the video for this here.
We all need to be more vigilant in keeping our families, our businesses and ourselves safe and cyber-secure. And some the best tools we have are education, communication, and awareness.
YouTube is one of the most popular websites in the world, but can expose younger viewers to inappropriate content. By following these 5 precautionary measures you can keep your child safe from any content that may be unsuitable.
The post How to keep your child safe on YouTube appeared first on We Live Security.
There could be many benefits of having a connected household, but connecting your appliances to the internet could also put them at risk of being hacked. We provide some useful tips to make sure all of your connected devices are protected.
The post Should I worry about my connected devices? appeared first on We Live Security.
Now more than ever, its important to make sure your social media accounts are safe and secure. Here are our 6 top tips to make your social media accounts almost unhackable.
The post How to make your social media accounts (almost) unhackable appeared first on We Live Security.
Virtual private networks use a public network, usually the internet, to connect remote users together. Here, we take a closer looks at VPNS and help you choose the right one for your needs.Â
The post VPN for beginners appeared first on We Live Security.
Scareware is a strategy that Cybercriminals use to trick users into buying and downloading unnecessary and potentially dangerous software. Listen to our top tips to identify whether a threat is real or not.
The post Scareware: How to tell if a threat isn’t real appeared first on We Live Security.
Your credit card information is highly sensitive and always at risk of theft. Check out our 5 ways of avoiding credit card fraud.
The post 5 ways to avoid credit card fraud appeared first on We Live Security.
You donât need to buy a tablet for every member of the family. Our insider tips will help you share a tablet rather than having to buy more than one device.
The post 5 tips for sharing an iPad or Android tablet in your home appeared first on We Live Security.