Your car needs regular servicing to keep it in good condition. Your computer, mobile devices, and software applications need regular…
Author: Elizabeth Cornell
Thousands of cell phones are stolen and infiltrated every month. Even some Fordham students have been victims of…
When you got back from vacation, your friends looked at you with amazement and admiration: You went to the Louvre…
Always remember: there is no permanent “delete” button on the Internet. Once you’ve posted information about what you’re doing or…
Identity theft happens when someone accesses your personal information and uses it without your permission and for their personal gain.…
By Meiren Park, IT Communications Intern You get a lot of links thrown at you everyday, from various sources: email,…
John_Smith. Fordham_Baby_Girl. Tatiana19. Fordham_QB_52 When selecting a screen name, avoid a name that might identify you. Even an identifier…
It’s one thing to lend your smartphone to a friend to make a quick call, or share a computer with…
Whenever you post information about yourself online, be cautious about what you share. Even if you don’t post your exact…
Inappropriate sharing of secrets always makes for a good plot twist in a Shakespearean play: O negligence! Fit for a…