Security. Privacy. Shopping. Travel. |

April 2015

Cocoon protects web surfers from malvertising

By |April 16th, 2015

With so many malvertising ads appearing on popular and trusted websites lately, it is easy for anyone who has operating system or software vulnerabilities to become infected.

Why Malvertising?
Dell Tech Page One explains why cyber criminals use high-profile sites to deliver malicious ads:
Cybercriminals create legitimate ads and may place a series of malware-free ads on a trusted (high-traffic) site that supports third party ads. These ads could remain malware-free for several months while frequent users of these trusted and reputable websites are led to believe that the ad links are safe. Later on, cybercriminals inject malicious code into the ‘trusted’ ad […]

March 2015

Oversharenting: Kyle’s Musical Potty Chair

By |March 17th, 2015

While perusing the Washington Post this morning, I ran smack into some new parental terminology. It appears that when you over-share your kids stuff on social media that you could be guilty of oversharenting. And according to a new C.S. Mott Children’s Hospital national poll survey, Parents on Social Media: Likes and Dislikes of Sharenting:

Over half of mothers and one-third of fathers discuss parenting on social media.
Parents say social media is most useful for making them feel they are not alone (72%).
Three-quarters of parents point to “oversharenting” by another parent.

And more parents who share information about their children online are more interested in the […]

Password security in the workplace

By |February 3rd, 2015

In light of recent news concerning terrible passwords consumers had in 2014, cybersecurity evaluations company, Software Advice, decided to run a survey to gauge password security in the workplace. Their report investigates the prevalence of best and worst password practices in the U.S. workplace, as well as offer recommendations for how businesses can improve their own password practices.

They key findings of the report included:

Only 56% of employees surveyed are confident that their password usage habits in the workplace are secure.
Password reuse is less endemic in the workplace than among consumers, with only 31 percent of employees admitting to this […]

January 2015

Infographic: Data Privacy Day 2015

By |January 28th, 2015

Today marks the 9th annual international Data Privacy Day that is celebrated throughout the U.S., Canada, and Europe.

Data Privacy Day (DPD) is an international effort centered on Respecting Privacy, Safeguarding Data and Enabling Trust. – See more at:

For a comprehensive overview of DPD, visit
Data Privacy Day 2015



YouTube click-fraud Trojan.Tubrosa scam is on the loose

By |January 27th, 2015

Security researchers at Symantec are reporting that cybercriminals are taking advantage of the YouTube Partner Program, which lets people monetize their uploaded videos through advertisements. The scammers began distributing the malware last summer. The miscreants are compromising victim computers with malware to inflate video views. All of the scammer videos have embedded ads that generates revenue to propagate their click-fraud campaigns.

Symantec has listed five steps in this type of click-fraud attack:

The attacker sends a spear-phishing email to the victim to infect their computer
Trojan.Tubrosa contacts a fake website
This creates a YouTube session with the referrer and useragent
Next, it silently opens a YouTube page
Finally, […]

Cocoon’s Shopping Safety Tips

By |January 11th, 2015

The Business Journals predicts that data breaches will become larger and more sophisticated than ever this year, with an additional warning to businesses and consumers — that they need to be prepared for continued changes in the cybercrime landscape.

Though the number of cyber attacks against U.S. retailers dropped 50 percent in 2014 —IBM research indicates that the number of compromised records actually increased 43 percent in 2014.
New techniques are allowing hackers to acquire massive amounts of confidential data with increased efficiency. This has allowed cyber criminals to impact a greater number of victims with each attack. In 2014, the primary mode […]

Cocoon Shopping 2015

By |January 5th, 2015

We are very excited about 2015 because we will be launching a new Cocoon shopping service soon. With options to shop within the secured privacy of Cocoon in 3 easy steps:

Get a FREE membership with Cocoon
Cash in as you shop
Cash out with Cocoon

This is a new shopping adventure that will offer privacy; security; great deals; coupons; discounts; and rebates. This new shopping venture will also enable us to enhance and improve development of Cocoon for future browsing & mobile privacy & security.
Cocoon Online Shopping Benefits

Accumulate money while you shop and cash out when you’re ready!*
Up to 75% off on […]

December 2014

Happy Holidays from Virtual World Computing!

By |December 24th, 2014

We would like to take this time to thank all our incredible customers for another entirely awesome year. We will be a bit quieter next week as many of us will be spending more time with friends and family — as we look toward 2015.
It is the one season of the year when we can lay aside all gnawing worry, indulge in sentiment without censure, assume the carefree faith of childhood, and just plain “have fun.”  Whether they call it Yuletide, Noel, Weinachten, or Christmas, people around the earth thirst for its refreshment as the desert traveller for the […]