Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

Security & Privacy

Information about potential threats to your personal and financial security covering desktops, laptops, and mobile devices.


5 password mistakes many people make

Proper password creation and protection are by far the most important parts of personal cyber security. A hacker with access to your login credentials can pretty much steal your online identity. In fact, the Verizon 2016 Data Breach Investigations Report found that 63 percent of observed hacks originated from poor password control. So, what kinds […]

What will it take to hold onto your pictures forever?

No matter your background or interests, there’s one thing you likely share with a lot of people out there: A love of photos. Without knowing you personally, we’re going to take a guess that you have snapped a selfie in the past 24 hours (after all, there are millions that hit the net every day). […]

Anthem’s security breach: How to defend against Phishing attacks

Last Wednesday, an Anthem employee noticed a suspicious database query taking place inside the company’s network. The query was suspicious because no one triggered such a request. This was indeed an attack on Anthem’s database. The hackers managed to steal information such as names of the insured, dates of birth, social security numbers, addresses, phone […]

Tons of temporary files can slow down a computer's performance.

Traditional Anti-Virus VS Cloud-based Anti-Virus

Few times in a row various experts claimed that traditional AV is dead. Some experts are disagree and most of the people does not really know the difference. Marketing specialists can claim that the cloud approach is new and improved protection solution.     Commercial trend of cloud security is very important for marketing and […]

Samsung device anti-theft security problem and how to fix it.

So what’s the problem exactly? Samsung’s software, designed to protect against thieves by allowing those who own a smartphone to remotely lock the device, see where it’s located and even make it ring even if it’s in silent mode.   Due to a security failure, which does not verify the source of commands sent to […]

From ZERO-DAY attacks to mobile device threats: The five hottest trends in cyber-security

Between remote connection from home, which blurs the distinction between personal and business information, to the increasing ability of hackers to break complex systems, what are the current five major trends in cyber-security? The cyber-security field is one of the hottest areas today because almost every one of us reveals much information on unusually large […]