IoT and Privacy: Keeping Secrets from your Webcam
This blog post was written by Bruce Snell. Have you ever put your kids to bed only to have them creep down the stairs later? We deal with this all the time so I decided to place a motion sensor in front of their door. Any time the sensor is ...
This Valentine’s Day, Share Your Love, Not Your Personal Data
This blog post was written by Bruce Snell. Valentine’s Day is just around the corner, are you ready? Have you bought the perfect gift and booked an intimate dinner? Maybe a nice romantic movie like Zoolander 2 or Deadpool? Or maybe, like many people out there, you’re still looking for ...
Learn How to Spot a Phishy Email and Stay Safe
This blog post was written by Bruce Snell. One piece of advice I always give (after update, update, update) is to never click on a suspicious link. A lot of times, those dodgy links are easy to spot, which is why cybercriminals try to be extra tricky to get you ...
Now Dolls Can be Hacked Too
This blog post was written by Bruce Snell. Soon after posting our Most Hackable Gifts blog, NBC 5 in Chicago released an investigative report on a popular interactive doll being hacked. In the report, the security researcher detailed some of what he was able to get from the Barbie doll ...
What is a Hacker?
You probably think you know what a “hacker” is, but the images portrayed in the media can be misleading. You may be thinking of a geeky-looking guy who causes peoples’ computers to get infected with viruses or cracks passwords to raid the accounts of big business. This is one kind ...
How to Stop Sharing Your Location Information
The Internet helps us connect and share with people around the world, but there are some people with whom you definitely shouldn’t be sharing your information. Although it’s not pleasant to think about, it’s not just friends and family that can see your online posts, bad guys can too, including ...
Why use a VPN?
If you want to be a pro at privacy, here’s a tip: When it’s time to go online, whether it’s at an airport lounge, coffee house, hotel, or any other public Wi-Fi spot, don’t log into any of your accounts unless you use a virtual private network (VPN). A VPN ...
Back to school Tech Security for College Students
Some of us remember college dorm days, when students were envied if they had their own typewriter. These days, college students must have a personal laptop computer, and a smartphone, and their lives revolve around these connected devices. Such dependency should be proactively protected from loss or theft. Campus security ...
Passwords in Real Life: Don’t be Lazy
It’s tough being responsible sometimes. And managing responsibilities for what is precious in your life usually takes a little extra thought. Let’s say you’ve just welcomed a beautiful set of triplets into the world. Lucky you . . . and lots to managed! But, you wouldn’t give all these babies ...
Don’t Rely on the Password Reset
Think about your keychain. It probably holds the necessities: car keys, home keys, work keys, miscellaneous keychains you bought on your previous vacations. Now, imagine you have a keychain full of these keys that all look the same, but each only opens a specific door. Sounds kind of like your ...