Articles by Author
How To Guides and Tutorials
Online Shopping Festivals – Things to Do Before Clicking on Add to Cart
Online sales are a huge rage these days! E-commerce firms are competing with each other to offer...Mar 29, 2017 | 3 MIN READ
Family Safety
These Cute Teddy Bears Have Been Recording Your Kids
When we think of cyberhacks, we often think of criminals trying to break into a network of...Mar 28, 2017 | 5 MIN READ
Privacy & Identity Protection
Cybercriminals Learn to Love Extensions like Toolbars in Targeted Attacks
In the late 90s and early 2000s, most web browsers came with small, add-on programs to enhance...Mar 22, 2017 | 3 MIN READ
Privacy & Identity Protection
What Is Ransomware and Who Does It Target?
Lockouts—they happen. We forget our keys, we can’t remember our passwords—and sometimes, someone else locks us out....Mar 17, 2017 | 5 MIN READ
Mobile Security
Pre-Installed Malware on Android Devices Expose Flaws in Supply Chain
Pencils come with erasers, books come with pages, and taxes (most of the time) come with returns....Mar 16, 2017 | 3 MIN READ
Privacy & Identity Protection
E-Filing Your Tax Returns? Don’t Let It Tax Your Security
How many of my readers are aware of Digital India campaign? Yes, I am sure just about...Mar 16, 2017 | 4 MIN READ
Family Safety
Is Rapid Tech Growth Leaving Your Family’s Digital Safety in the Dust?
IoT family safety: Technology is skyrocketing. Is your family ready to step up its digital safety efforts? 6 tips for...Mar 14, 2017 | 4 MIN READ
Mobile Security
How To Protect Today’s Smart Home
We love our kids, and we want the best for them. In today’s connected world, the role...Mar 14, 2017 | 4 MIN READ
How To Guides and Tutorials
College Basketball Finals Shouldn’t Result in March Mayhem: 4 Security Tips to Stay Safe
March is in full swing, which can only mean we’re about to enter the mayhem that is...Mar 13, 2017 | 3 MIN READ
Mobile Security
A Reflection on Mobile World Congress
This blog post was written by Nick Viney. As the dust settles on another busy year at...Mar 13, 2017 | 3 MIN READ
Privacy & Identity Protection
How to Identify Three Common Phishing Scams
Time and time again, phishing scams have gotten the best of us. Take the recent W-2 attacks...Mar 07, 2017 | 4 MIN READ
Mobile Security
MWC 2017: What We Learned About the Mobile Landscape
MWC (Mobile World Congress) has come and gone yet again, and over the course of the four-day...Mar 06, 2017 | 3 MIN READ