Featured Blogs
What You Need to Know About Livestreaming
Livestreaming is trending thanks to the convenience it brings. It is not just about watching matches online, you can also...
What You Need to Know About Security Threats in 2017
2016 has been an exciting year on the tech front, with our hearts being won over by technology ranging from...
What You Need to Know About Stagefright
Any mention of stage fright transports us to our schooldays when we had to go up on stage to recite...
What You Need to Know About the Equifax Data Breach
Equifax, one of the three major credit bureaus in the country, said on Thursday it suffered a major breach in...
What You Need to Know About the FedEx SMiShing Scam
You receive a text message saying that you have a package out for delivery. While you might feel exhilarated at...
What You Need to Know About the Google Chrome Vulnerabilities
While you might have been preoccupied with ghosts and goblins on Halloween night, a different kind of spook began haunting...
What You Need to Know About the Latest IoT Device Flaws
The McAfee Advanced Threat Research (ATR) team recently uncovered a security flaw in a popular connected garage door opener and...
What Your Password Says About You
At the end of last year, a survey revealed that the most popular password was still “123456,” followed by “password.” These...
What’s in the Box?
2018 was another record-setting year in the continuing trend for consumer online shopping. With an increase in technology and efficiency,...
What’s the Right Age to Give Your Child a Phone?
“Can I pleeease have my own phone?” The “first phone” is one of the most loaded questions a child can...
WhatsApp Gold: Why Upgrading Isn’t Always a Golden Idea
Whether it was the cool sneakers everyone had in grade school, or the latest cell phone release, we always want...
WhatsApp Security Hacks: Are Your ‘Private’ Messages Really Ever Private?
WhatsApp one of the largest instant messengers and considered by many a social network of its own. So, in continuing...
WhatsApp Users: Secure Your Desktop With These Tips
With over 500 million daily active users, WhatsApp is one of the world’s most popular messaging platforms. In an effort...
WhatsApp with End-to-End Encryption?
Throughout the past year, many mobile messaging apps have come under fire for inherent security vulnerabilities. This month, WhatsApp (one...
WhatsApp With That? Security Flaw in Mobile Messaging Apps
Mobile phone calls and text messages seem to be going the way of the dinosaurs. In their place, a plethora...
What’s a Parent to Do? Closing the Protection Gap between You and Your Children.
Hands down, children look to their parents to keep them safe online more than anyone else, which begs the question—what’s...
What’s in the Box? Part II: Hacking the iParcelBox
Package delivery is just one of those things we take for granted these days. This is especially true in the...
What’s in Your IoT Cybersecurity Kit?
Did you know the average internet-enabled household contains more than ten connected devices? With IoT devices proliferating almost every aspect...
What’s the Deal with Mirai? A Rundown on one of the Biggest Botnets
Every once in a while, a type of malware become so effective and prevalent that it dominates headlines for weeks....
What’s the Meaning of VPN? VPN Defined
A virtual private network (VPN) is a tool that enables users to protect their privacy while using an internet connection....
What’s Your Click IQ?
The recent celebrity photo hacks are an unfortunate reminder of how devastating or embarrassing it can be to have your...
When AI Voices Target World Leaders: The Growing Threat of AI Voice Scams
If someone called you claiming to be a government official, would you know if their voice was real? This question...
When Does My Child Really Need A Phone?
Deciding when to give your child a phone is not an easy task. Should you wait until they start high...
When Hackers Get Hacked: the Malware Servers of a Data-Stealing Campaign
Selling stolen data is an easy way for cybercriminals to make some quick money on cyber black markets. The Flowchart...
When the Digital Impacts the Physical
Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices…until they...
When Voice Recognition Goes Wrong: YouTube Videos Can Say “Ok Google”
YouTube videos are like today’s candid camera: they can be fun, educational, and, sometimes, a window into someone else’s most...
Where’s the Truth Online? How to Build Your Family’s Digital Discernment
Note: This is Part I of a series on equipping your family fight back against fake news online. Fake news...
