Articles by Author
Privacy & Identity Protection
The Holiday Season is Here, Spreading Hackable Gifts Wide and Near
We’re releasing our Most Hackable Gifts list to remind you that smart gadgets are at risk of cybersecurity shenanigans, and...Nov 20, 2016 | 5 MIN READ
Mobile Security
Bypassing Your Passcode: How One Online Hack Can Unleash Your Photos and Texts
The bypass is simple: Siri and the accessibility feature in iOS called VoiceOver get tricked, and all passcodes and Touch...Nov 18, 2016 | 3 MIN READ
Security News
21st Century Bank Heist Strikes Tesco Bank, Could Portend Future Attacks
Last Tuesday, as Americans were filling out their ballots, about 40,000 U.K. citizens were left wondering what...Nov 18, 2016 | 5 MIN READ
Mobile Security
So You Think Your Phone Is Hacked—Here’s What to Do
Once a phone is hacked, your payment information is in the cybercriminals hands. How to Know If Your Mobile Device...Nov 15, 2016 | 3 MIN READ
How To Guides and Tutorials
Blogging Best Practices and Hot Topics for Security Marketers
Download our blogging best practices guide to learn more about enhancing titles, optimizing blog format, post frequency, and more.Nov 08, 2016 | 3 MIN READ
Security News
App Store Flooded with Phony Retail Apps to Kick Off Holiday Season
There’s more holiday-related cybercrime now more than ever. 'Tis the season for fake retail mobile apps, designed by cybercrooks to...Nov 08, 2016 | 4 MIN READ
Family Safety
Cyber Parenting – Let’s Hear What Mothers Have to Say
Children’s Day is around the corner and it has me thinking. With all the brouhaha over a...Nov 07, 2016 | 5 MIN READ
Privacy & Identity Protection
How a Single Password Triggered the Business Insider Breach
One of the biggest names in business publication, Business Insider, came under siege this week. The attack was yet another...Nov 03, 2016 | 3 MIN READ
Privacy & Identity Protection
How an Online Prank Had Countless Phones Dialing 911
An Arizona teen tweeted out a link that ended up forcing mobile phones into continuously dialing 911.Nov 01, 2016 | 4 MIN READ
Privacy & Identity Protection
How Valuable Is Your Health Care Data?
This blog was written by Bruce Snell. Health care is a hot topic in security right now....Oct 30, 2016 | 4 MIN READ
Privacy & Identity Protection
Unsecured IoT Devices Behind Last Week’s DDoS Attack, More Likely to Come
Cybercriminals used an army of infected IoT devices, then constructed one of the largest DDoS attacks in recent history.Oct 28, 2016 | 4 MIN READ
Mobile Security
Boo! The Spookiest Mobile Hacks of 2016
Endless candy, an excuse to dress up as a character from your favorite comic book, and carving...Oct 28, 2016 | 4 MIN READ