Security. Privacy. Shopping. Travel. |

January 2015

Infographic: Data Privacy Day 2015

By |January 28th, 2015

Today marks the 9th annual international Data Privacy Day that is celebrated throughout the U.S., Canada, and Europe.

Data Privacy Day (DPD) is an international effort centered on Respecting Privacy, Safeguarding Data and Enabling Trust. – See more at:

For a comprehensive overview of DPD, visit
Data Privacy Day 2015



YouTube click-fraud Trojan.Tubrosa scam is on the loose

By |January 27th, 2015

Security researchers at Symantec are reporting that cybercriminals are taking advantage of the YouTube Partner Program, which lets people monetize their uploaded videos through advertisements. The scammers began distributing the malware last summer. The miscreants are compromising victim computers with malware to inflate video views. All of the scammer videos have embedded ads that generates revenue to propagate their click-fraud campaigns.

Symantec has listed five steps in this type of click-fraud attack:

The attacker sends a spear-phishing email to the victim to infect their computer
Trojan.Tubrosa contacts a fake website
This creates a YouTube session with the referrer and useragent
Next, it silently opens a YouTube page
Finally, […]

Cocoon’s Shopping Safety Tips

By |January 11th, 2015

The Business Journals predicts that data breaches will become larger and more sophisticated than ever this year, with an additional warning to businesses and consumers — that they need to be prepared for continued changes in the cybercrime landscape.

Though the number of cyber attacks against U.S. retailers dropped 50 percent in 2014 —IBM research indicates that the number of compromised records actually increased 43 percent in 2014.
New techniques are allowing hackers to acquire massive amounts of confidential data with increased efficiency. This has allowed cyber criminals to impact a greater number of victims with each attack. In 2014, the primary mode […]

Cocoon Shopping 2015

By |January 5th, 2015

We are very excited about 2015 because we will be launching a new Cocoon shopping service soon. With options to shop within the secured privacy of Cocoon in 3 easy steps:

Get a FREE membership with Cocoon
Cash in as you shop
Cash out with Cocoon

This is a new shopping adventure that will offer privacy; security; great deals; coupons; discounts; and rebates. This new shopping venture will also enable us to enhance and improve development of Cocoon for future browsing & mobile privacy & security.
Cocoon Online Shopping Benefits

Accumulate money while you shop and cash out when you’re ready!*
Up to 75% off on […]

December 2014

Happy Holidays from Virtual World Computing!

By |December 24th, 2014

We would like to take this time to thank all our incredible customers for another entirely awesome year. We will be a bit quieter next week as many of us will be spending more time with friends and family — as we look toward 2015.
It is the one season of the year when we can lay aside all gnawing worry, indulge in sentiment without censure, assume the carefree faith of childhood, and just plain “have fun.”  Whether they call it Yuletide, Noel, Weinachten, or Christmas, people around the earth thirst for its refreshment as the desert traveller for the […]

6 Major Security Themes of 2014

By |December 18th, 2014

Security Themes
In their newest report, the cyber security research and reviews team at Software Advice, led by Daniel Humphries, asked 25 IT security thought leaders and professionals to decide if 2014’s major security themes were “overrated” or “underrated,” and why—giving industry watchers insight into their thinking as we approach 2015. The six themes were:

The “Year of the Breach”
The Heartbleed bug
The Death of Antivirus
The Rise of Mobile Malware
The “Employee Threat”
The recent upsurge in security spending

Here are the key findings from the report:

Even after sustained media coverage, a majority of experts still describe the “breachiness” of 2014 as “underrated.”
The threat posed […]

SMB transition to EMV technology may be a rough road

By |December 10th, 2014

This month, information security reviews firm, Software Advice, conducted a survey of 385 random consumers, and 160 SMB (small to midsized business) owners and executives, to see how prepared these two groups were, respectively, for the pending October 2015 U.S. transition to “EMV” (Europay, MasterCard and Visa)- a global standard for payment cards equipped with computer chips that are used to authenticate card transactions. The results of the report were surprising:

A majority of consumers (88%) have never made a purchase in the U.S. using an EMV terminal. Although certain EMV information sites suggest that 100 million chip cards are […]

November 2014

Happy Thanksgiving from Virtual World Computing (VWC)

By |November 26th, 2014


Happy Thanksgiving holiday to all of our valued customers and friends. We believe that our customers, friends, and family are our greatest asset — it’s what keeps us moving forward in this global privacy battle. We are thankful that we love what we do here at VWC, and we appreciate all the support that we have received for Cocoon from our online community this year.
Thanksgiving is the time of year where we can all sit back and enjoy sharing food and warm conversations with family and friends. It’s a time to reflect and give gratitude for life itself.

We hope that you […]

Privacy: How public is your private information?

By |November 20th, 2014

Hackers, miscreants, identity thieves, the government, cyber-criminals, data miners, advertisers, and online stalkers are just a few of the entities that build profiles of you from public information that is freely available online.  Simply querying an online search engine like Google or Bing can reveal your social media identity and your public records identity. With just two pieces of information from social media and public records – identity thieves, miscreants and online stalkers can use Google street to see your house or TinEye to match up an image with your public profile.

From a criminal perspective – it’s a goldmine of […]

Embed This Image On Your Site (copy code below):

Behavioral Advertising & Tracking | Creepy

By |November 6th, 2014

Through behavioral advertising, companies can collect information about your online browsing habits by building a profile that is tied to a random ID number. Through time and your digital footprint on the web, it is possible for these companies to guess your age group, gender, and purchase interests.
Behavioral Advertising Defined
TRUSTe defines Online behavioral advertising (OBA) as:
A broad set of activities companies engage in to collect information about your online activity (like webpages you visit) and use it to show you ads or content they believe to be more relevant to you.
From brand advertisers to mobile apps, and from search engines to […]