Featured Blogs
Quizzes and Other Identity Theft Schemes to Avoid on Social Media
Before you take the fun-looking quiz that popped up in your social media feed, think twice. The person holding the answers may be a hacker. Where...
Avoid Making Costly Mistakes with Your Mobile Payment Apps
There used to be a time when one roommate split the cost of rent with another by writing a check. Who still owns a checkbook these days? Of...
Teen Slang – What You Need To Know To Understand Your Teen
Got any ‘rizz’? Did you ‘slay’ that dinner? Is the ‘cozzie livs’ stressing you out? If you do not comprehendo,...
Are You a Victim of a Deepfake Attack? Here’s What to Do Next
With the rise of cheap and easy-to-use AI tools, deepfake attacks find themselves likewise on the rise. Startling as that...
Distinctive Campaign Evolution of Pikabot Malware
Authored by Anuradha and Preksha Introduction PikaBot is a malicious backdoor that has been active since early 2023. Its modular...
The Four Rs of Personal Mobile Security
Smartphones have enabled a whole new digital world, where apps are gateways to just about any service imaginable. However, like...
How to Avoid Solar Eclipse Scams
Scammers are turning a buck on the eclipse. A rash of eclipse scams have appeared online, many involving the sale...
How to Protect Against New Types of Scams Like QR Phishing
Four in ten Americans say they use peer-to-peer payment services, like Venmo, PayPal, or Apple Pay, at least once a...
How to Steer Clear of Tax Season Scams
It’s that time of year again – tax season! Whether you’ve already filed in the hopes of an early refund...
The Top Tax Scams of 2024
While last-minute tax filers stare down the clock, scammers look for easy pickings. Tax scams are in full swing as...
Stay Cyber Savvy: Your 5-Step Guide to Outsmarting Phishing Scams
In today’s digital landscape, distinguishing between legitimate communications and phishing attempts can feel like navigating a labyrinth blindfolded. Phishing is...
A Finance Journalist Fell Victim to a $50K Vishing Scam – Are You Also at Risk?
In a world where digital communication dominates, the art of scamming has evolved into a sophisticated game of deception. A...
How to Protect Yourself From Social Media Harassment
Some conversations on social media can get … heated. Some can cross the line into harassment. Or worse. Harassment on...
How to Protect Your Streaming Accounts: Lessons from Roku’s Data Leak
In recent news, Roku, a leading streaming platform, reported that over 591,000 user accounts were affected by credential stuffing attacks....
How Do You Manage Your Social Media Privacy?
‘Ensure your privacy settings are set to the highest level’ – if you’ve been reading my posts for a bit...
How to Protect Yourself Against AI Voice Cloning Attacks
Imagine receiving a call from a loved one, only to discover it’s not them but a convincing replica created by...
Redline Stealer: A Novel Approach
Authored by Mohansundaram M and Neil Tyagi A new packed variant of the Redline Stealer trojan was observed in the...
How To Teach Your Kids About Deepfakes
Is it real? Is it fake? Deepfake technology has certainly made everything far more complicated online. How do you know...