Cybersecurity Tips
US-CERT Cybersecurity Tips
Attacks and Threats
- Handling Destructive Malware
- Understanding Hidden Threats: Rootkits and Botnets
- Dealing with Cyberbullies
- Avoiding the Pitfalls of Online Trading
- Identifying Hoaxes and Urban Legends
- Understanding Hidden Threats: Corrupted Software Files
- Recognizing Fake Antiviruses
- Recognizing and Avoiding Spyware
- Understanding Denial-of-Service Attacks
- Avoiding Social Engineering and Phishing Attacks
- Preventing and Responding to Identity Theft
- Recovering from Viruses, Worms, and Trojan Horses
Email and Communication
- Staying Safe on Social Networking Sites
- Understanding Your Computer: Email Clients
- Understanding Digital Signatures
- Using Instant Messaging and Chat Rooms Safely
- Using Caution with Email Attachments
- Benefits of BCC
- Reducing Spam
- Benefits and Risks of Free Email Services
General Information
General Security
- IRS and US-CERT Caution Users: Prepare for Heightened Phishing Risk This Tax Season
- Sochi 2014 Olympic Games
- International Mobile Safety Tips
- Keeping Children Safe Online
- Debunking Some Common Myths
- Real-World Warnings Keep You Safe Online
- Understanding Anti-Virus Software
- Understanding Firewalls
- Good Security Habits
- Choosing and Protecting Passwords
- Coordinating Virus and Spyware Defense
- Safeguarding Your Data
Mobile Devices
- Protecting Portable Devices: Physical Security
- Holiday Traveling with Personal Internet-Enabled Devices
- Cybersecurity for Electronic Devices
- Using Caution with USB Drives
- Securing Wireless Networks
- Protecting Portable Devices: Data Security
- Defending Cell Phones and PDAs Against Attack
Privacy
- Supplementing Passwords
- Effectively Erasing Files
- How Anonymous Are You?
- Understanding Encryption
- Protecting Your Privacy
Safe Browsing
- Shopping Safely Online
- Understanding Bluetooth Technology
- Understanding Web Site Certificates
- Avoiding Copyright Infringement
- Understanding Your Computer: Web Browsers
- Understanding Internationalized Domain Names
- Evaluating Your Web Browser's Security Settings
- Browsing Safely: Understanding Active Content and Cookies