Security. Privacy. Shopping. Travel. |

December 2014

Happy Holidays from Virtual World Computing!

By |December 19th, 2014

We would like to take this time to thank all our incredible customers for another entirely awesome year. We will be a bit quieter next week as many of us will be spending more time with friends and family — as we look toward 2015.
It is the one season of the year when we can lay aside all gnawing worry, indulge in sentiment without censure, assume the carefree faith of childhood, and just plain “have fun.”  Whether they call it Yuletide, Noel, Weinachten, or Christmas, people around the earth thirst for its refreshment as the desert traveller for the […]

6 Major Security Themes of 2014

By |December 18th, 2014

Security Themes
In their newest report, the cyber security research and reviews team at Software Advice, led by Daniel Humphries, asked 25 IT security thought leaders and professionals to decide if 2014’s major security themes were “overrated” or “underrated,” and why—giving industry watchers insight into their thinking as we approach 2015. The six themes were:

The “Year of the Breach”
The Heartbleed bug
The Death of Antivirus
The Rise of Mobile Malware
The “Employee Threat”
The recent upsurge in security spending

Here are the key findings from the report:

Even after sustained media coverage, a majority of experts still describe the “breachiness” of 2014 as “underrated.”
The threat posed […]

SMB transition to EMV technology may be a rough road

By |December 10th, 2014

This month, information security reviews firm, Software Advice, conducted a survey of 385 random consumers, and 160 SMB (small to midsized business) owners and executives, to see how prepared these two groups were, respectively, for the pending October 2015 U.S. transition to “EMV” (Europay, MasterCard and Visa)- a global standard for payment cards equipped with computer chips that are used to authenticate card transactions. The results of the report were surprising:

A majority of consumers (88%) have never made a purchase in the U.S. using an EMV terminal. Although certain EMV information sites suggest that 100 million chip cards are […]

November 2014

Cocoon’s Cyber Monday Shopping Safety Tips

By |November 30th, 2014

Following hot on the heels of Black Friday —  the day of exceptional bargains is finally here! Last year, Cyber Monday online shopping sales hit a whopping $2.29 billion (up 2.6 percent from 2012). Cocoon has eight common sense Cyber Monday shopping safety tips to share with you today:

 Cocoon’s Cyber Monday Shopping Safety Tips 

 Update your security software and use both anti-virus and anti-malware. Computers: You should always keep your operating system and firmware updated. Your operating system should include antivirus, anti-malware/spyware, and a firewall. All software on your computer should be updated to the latest version, and this includes keeping the browsers that you shop […]

Happy Thanksgiving from Virtual World Computing (VWC)

By |November 26th, 2014


Happy Thanksgiving holiday to all of our valued customers and friends. We believe that our customers, friends, and family are our greatest asset — it’s what keeps us moving forward in this global privacy battle. We are thankful that we love what we do here at VWC, and we appreciate all the support that we have received for Cocoon from our online community this year.
Thanksgiving is the time of year where we can all sit back and enjoy sharing food and warm conversations with family and friends. It’s a time to reflect and give gratitude for life itself.

We hope that you […]

Privacy: How public is your private information?

By |November 20th, 2014

Hackers, miscreants, identity thieves, the government, cyber-criminals, data miners, advertisers, and online stalkers are just a few of the entities that build profiles of you from public information that is freely available online.  Simply querying an online search engine like Google or Bing can reveal your social media identity and your public records identity. With just two pieces of information from social media and public records – identity thieves, miscreants and online stalkers can use Google street to see your house or TinEye to match up an image with your public profile.

From a criminal perspective – it’s a goldmine of […]

Embed This Image On Your Site (copy code below):

Behavioral Advertising & Tracking | Creepy

By |November 6th, 2014

Through behavioral advertising, companies can collect information about your online browsing habits by building a profile that is tied to a random ID number. Through time and your digital footprint on the web, it is possible for these companies to guess your age group, gender, and purchase interests.
Behavioral Advertising Defined
TRUSTe defines Online behavioral advertising (OBA) as:
A broad set of activities companies engage in to collect information about your online activity (like webpages you visit) and use it to show you ads or content they believe to be more relevant to you.
From brand advertisers to mobile apps, and from search engines to […]

October 2014

Public Wi-Fi? Legitimate, or rogue access point?

By |October 21st, 2014

Public Wi-Fi is everywhere these days. Whether you are getting your oil changed, wolfing down some fast food from MacDonald’s, or stopping by the local brewery after work to nab a pint, you can access the Internet from just about anywhere  — for a price. Though it is convenient and saves money on your wireless data plan, is public Wi-Fi really free?

Public Wi-Fi Hotspots
All public Wi-Fi (hotspots) can pose major security risks. If your device automatically connects to public Wi-Fi hot spots, you are in danger of having your data intercepted by a hacker. Do you really need to buy that […]

Smartphone secrets lost or stolen

By |October 17th, 2014

In 2013, Americans lost approximately 1.4 million smartphones, while 3.1 million became victims of smartphone theft. So, if you are trusting your smartphone to keep all your secrets — you need to consider the possibility of theft or device loss.
When Smartphone panic looms
I get a really sick feeling that settles into the pit of my stomach when I realize my phone is no longer an extension of my hand. Sometimes I turn around in circles while I scan the area. Other times, I look a little crazy and overly-animated, but I always manage to get my act together. Either I login […]

Embed This Image On Your Site (copy code below):

Cocoon + AudioEye to offer accessible web surfing

By |October 8th, 2014

Accessible web surfing
We are pleased to announce that AudioEye®, Inc., creator of the Audio Internet® patented audio browsing and automated publishing technology platform has entered into cross-licensing and re-seller agreements with our Cocoon branded secure browser.

We are very excited about working with AudioEye® and developing a browser which enables individuals with hearing, seeing, learning and motor function disabilities to have better and more secure access to the web. Through this partnership, the privacy and security Cocoon provides will now include better accessibility for all users.
We are dedicated
We’ve always been dedicated to the end-user’s Internet experience and in bringing Internet […]