Featured Blogs
Introduction to “Is Your Digital Front Door Unlocked?” a book by Gary Davis
“Is Your Digital Front Door Unlocked?” explores the modern implications of our human nature: our inherent inclination to share our...
Apple iOS Attack Underscores Importance of Threat Research
The recent discovery of exploit chains targeting Apple iOS is the latest example of how cybercriminals can successfully operate malicious campaigns, undetected,...
7 Questions to Ask Your Child’s School About Cybersecurity Protocols
Just a few weeks into the new school year and, already, reports of malicious cyberattacks in schools have hit the...
Analyzing and Identifying Issues with the Microsoft Patch for CVE-2018-8423
Introduction As of July 2019, Microsoft has fixed around 43 bugs in the Jet Database Engine. McAfee has reported a...
14 Million Customers Affected By Hostinger Breach: How to Secure Your Data
Whether you’re a small business owner or a blogger, having an accessible website is a must. That’s why many users...
Beware of Back-To-School Scams
These days it seems that there is a scam for every season, and back-to-school is no different. From phony financial...
Ellen DeGeneres Instagram Hack: What You Can Do to Protect Your Account
Today was not an easy morning for Ellen DeGeneres. She woke to find that her Instagram account was briefly hacked...
Clicks & Cliques: How to Help Your Daughter Deal with Mean Girls Online
According to a new report released by the National Center for Education Statistics (NCES), mean girls are out in force online....
Lights, Camera, Cybersecurity: What You Need to Know About the MoviePass Breach
If you’re a frequent moviegoer, there’s a chance you may have used or are still using movie ticket subscription service...
Boost Your Bluetooth Security: 3 Tips to Prevent KNOB Attacks
Many of us use Bluetooth technology for its convenience and sharing capabilities. Whether you’re using wireless headphones or quickly Airdropping...