Articles by Author

Family Safety
School of Cyberthreats: 3 Attacks Impacting Today’s Schools
Educational institutions are data-rich gold mines. And cybercriminals have taken notice.Jul 23, 2019 | 5 MIN READ

Security News
Downloaded FaceApp? Here’s How Your Privacy Is Now Affected
If you’ve been on social media recently, you’ve probably seen some people in your feed posting images of themselves looking...Jul 18, 2019 | 2 MIN READ

Mobile Security
Is Your WhatsApp Being Weird? You May Need to Check For Hidden Malware
With over 2.5 billion monthly active users that have accumulated since its fruition, Android has seen massive growth over the...Jul 12, 2019 | 2 MIN READ

How To Guides and Tutorials
Watch Your Webcam: Tips to Protect Your Mac From Zoom Hackers
You’ve probably heard of the popular video conferencing platform, Zoom. This platform enables its millions of users in various locations...Jul 10, 2019 | 3 MIN READ

Mobile Security
Evolved IoT Linux Worm Targets Users’ Devices
Since the early ‘90s, Linux has been a cornerstone of computer operating systems. Today, the system has been crafted into...Jul 09, 2019 | 3 MIN READ

Family Safety
Is Your Smart Home Secure? 5 Tips to Help You Connect Confidently
With so many smart home devices being used today, it’s no surprise that users would want a tool to help...Jul 03, 2019 | 3 MIN READ
Privacy & Identity Protection
#Verified or Phishing Victim? 3 Tips to Protect Your Instagram Account
If you’re an avid Instagram user, chances are you’ve come across some accounts with a little blue checkmark next to...Jun 28, 2019 | 3 MIN READ

Mobile Security
Catch a Ride Via Wearable
Commuters and travelers alike want to get to their destination quickly and easily. The advent of wearable payments helps make...Jun 25, 2019 | 3 MIN READ

Privacy & Identity Protection
Process Reimaging: A Cybercrook’s New Disguise for Malware
As of early 2019, Windows 10 is running on more than 700 million devices, including PCs, tablets, phones, and even...Jun 20, 2019 | 3 MIN READ

How To Guides and Tutorials
3 Tips Venmo Users Should Follow to Keep Their Transactions Secure
You’ve probably heard of Venmo, the quick and convenient peer-to-peer mobile payments app. From splitting the check when eating out...Jun 20, 2019 | 3 MIN READ

Privacy & Identity Protection
Stop Discarding Devices Frequently- It’s Risky for Mother Earth And Your Cybersecurity
“Aunty, do you happen to have any waste paper at home? I need them for my Environment...Jun 13, 2019 | 4 MIN READ

How To Guides and Tutorials
Bargain or Bogus Booking? Learn How to Securely Plan Summer Travel
With summertime just around the corner, families are eagerly looking to book their next getaway. Since vacation is so top-of-mind...Jun 12, 2019 | 4 MIN READ