Featured Blogs
7 Questions to Ask Your Child’s School About Cybersecurity Protocols
Just a few weeks into the new school year and, already, reports of malicious cyberattacks in schools have hit the...
Analyzing and Identifying Issues with the Microsoft Patch for CVE-2018-8423
Introduction As of July 2019, Microsoft has fixed around 43 bugs in the Jet Database Engine. McAfee has reported a...
14 Million Customers Affected By Hostinger Breach: How to Secure Your Data
Whether you’re a small business owner or a blogger, having an accessible website is a must. That’s why many users...
Beware of Back-To-School Scams
These days it seems that there is a scam for every season, and back-to-school is no different. From phony financial...
Ellen DeGeneres Instagram Hack: What You Can Do to Protect Your Account
Today was not an easy morning for Ellen DeGeneres. She woke to find that her Instagram account was briefly hacked...
Clicks & Cliques: How to Help Your Daughter Deal with Mean Girls Online
According to a new report released by the National Center for Education Statistics (NCES), mean girls are out in force online....
Lights, Camera, Cybersecurity: What You Need to Know About the MoviePass Breach
If you’re a frequent moviegoer, there’s a chance you may have used or are still using movie ticket subscription service...
Boost Your Bluetooth Security: 3 Tips to Prevent KNOB Attacks
Many of us use Bluetooth technology for its convenience and sharing capabilities. Whether you’re using wireless headphones or quickly Airdropping...
Digital Parenting: How to Keep the Peace with Your Kids Online
Simply by downloading the right combination of apps, parents can now track their child’s location 24/7, monitor their same social...
The Cerberus Banking Trojan: 3 Tips to Secure Your Financial Data
A new banking trojan has emerged and is going after users’ Android devices. Dubbed Cerberus, this remote access trojan allows...