Phishing is the attempt to get sensitive information such as bank details or passwords from someone by masquerading as a legitimate person or company. The word Phishing is a homophone of fishing due to the similarity of using bait to catch a victim.
There are different forms of phishing tactics. Most phishing occurs by using a disguised link in an email pretending to be from well-known companies asking to confirm details. Criminals may also try to trick you into giving away your personal information via Social Media messages or text messages. Criminals may try to fool you into installing a malicious software (malware) which can track and record the information you enter into your computer. Below are some of the commonly used tactics and warning signs you should be on the lookout for:
Every computer needs a processor (or CPU - Central Processing Unit). This vital bit of equipment determines how much data a computer can handle at one time and how quickly it can handle that data. This guide will help you decide which processor is right for you. We will be looking at the main things to consider such as what you will be using your computer for, what software you will want to run and help you understand the jargon!
First we will at the three main types of processor - desktop, mobile and server.
As the name suggests desktop processors are designed to be used in desktop computers. These processors essentially perform the same functions as a mobile processor, they are designed a little differently to handle the needs of a desktop computer. One main difference between a desktop and mobile processor is the ability to handle a higher thermal threshold.
Mobile processors are designed for use in laptops...