Featured Blogs
What Drives a Ransomware Criminal? CoinVault Developers Convicted
How often do we get a chance to learn what goes on in the minds of cybercriminals? Two members of...
What Else Kids Give Away When They Share Their Personal Passwords
Tweens and teens share clothes, secrets, and homework notes but there’s something else your kids may be sharing that isn’t...
What Everyone Can Learn from The Mark Zuckerberg Hack
When we were children, our role models seemed invincible. Could any five-year-old imagine a Superman who was less than perfect?...
What Families Can Learn from the #HisNameIsCayden Hashtag
A recent Facebook post that went viral cost an Atlanta man his job and opened an important conversation for families around...
What is a Backdoor Threat?
Did you accidentally leave the back door open? This thought can be scary because you know that leaving the back...
What is a Botnet?
The word botnet or bot is short for robot network. A botnet is a group of Internet-connected personal computers that...
What Is a Botnet?
What is a botnet? And what does it have to do with a toaster? We’ll get to that. First, a...
What is a Botnet? And What Does It Have to Do with Protecting “Smart Home” Devices?
The pop-up toaster as we know it first hit the shelves in 1926, under the brand name “Toastmaster.” With a...
What is a Cache?
Perhaps someone has told you that you need to “clear your cache,” but what does this mean and why should...
What Is a Crypto Wallet and How to Keep Your Wallet Secure?
A-list celebrities and social media influencers are now adding their voices to the roar of other cryptocurrency fans asking you...
What Is a Data Breach and How Do You Avoid It?
A data breach occurs when cybercriminals steal information from an organization’s database without permission from the owner or administrator. Data...
What Is a Data Broker?
A data broker is an organization that makes money by collecting your personal information, analyzing it, and licensing it out to...
What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes
What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes Imagine you’re driving down a highway...
What is a Denial-of-Service Attack?
You may have heard news reports about popular websites such as CNN, Amazon and Yahoo! being taken down by a...
What is a Firewall?
Most of us may have heard the term, and know it’s related to security in some way, but do you...
What is a Hacker?
You probably think you know what a “hacker” is, but the images portrayed in the media can be misleading. You...
What is a Keylogger?
Whether it is called a keylogger, spyware or monitoring software, it can be the equivalent of digital surveillance, revealing every...
What is a Man-in-the-Middle Attack?
There’s a reason why most people feel uncomfortable about the idea of someone eavesdropping on them—the eavesdropper could possibly overhear...