Featured Blogs
What’s the Right Age to Give Your Child a Phone?
“Can I pleeease have my own phone?” The “first phone” is one of the most loaded questions a child can...
WhatsApp Gold: Why Upgrading Isn’t Always a Golden Idea
Whether it was the cool sneakers everyone had in grade school, or the latest cell phone release, we always want...
WhatsApp Security Hacks: Are Your ‘Private’ Messages Really Ever Private?
WhatsApp one of the largest instant messengers and considered by many a social network of its own. So, in continuing...
WhatsApp Users: Secure Your Desktop With These Tips
With over 500 million daily active users, WhatsApp is one of the world’s most popular messaging platforms. In an effort...
WhatsApp with End-to-End Encryption?
Throughout the past year, many mobile messaging apps have come under fire for inherent security vulnerabilities. This month, WhatsApp (one...
WhatsApp With That? Security Flaw in Mobile Messaging Apps
Mobile phone calls and text messages seem to be going the way of the dinosaurs. In their place, a plethora...
What’s a Parent to Do? Closing the Protection Gap between You and Your Children.
Hands down, children look to their parents to keep them safe online more than anyone else, which begs the question—what’s...
What’s in the Box? Part II: Hacking the iParcelBox
Package delivery is just one of those things we take for granted these days. This is especially true in the...
What’s in Your IoT Cybersecurity Kit?
Did you know the average internet-enabled household contains more than ten connected devices? With IoT devices proliferating almost every aspect...
What’s the Deal with Mirai? A Rundown on one of the Biggest Botnets
Every once in a while, a type of malware become so effective and prevalent that it dominates headlines for weeks....
What’s the Meaning of VPN? VPN Defined
A virtual private network (VPN) is a tool that enables users to protect their privacy while using an internet connection....
What’s Your Click IQ?
The recent celebrity photo hacks are an unfortunate reminder of how devastating or embarrassing it can be to have your...
When AI Voices Target World Leaders: The Growing Threat of AI Voice Scams
If someone called you claiming to be a government official, would you know if their voice was real? This question...
When Does My Child Really Need A Phone?
Deciding when to give your child a phone is not an easy task. Should you wait until they start high...
When Hackers Get Hacked: the Malware Servers of a Data-Stealing Campaign
Selling stolen data is an easy way for cybercriminals to make some quick money on cyber black markets. The Flowchart...
When the Digital Impacts the Physical
Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices…until they...
When Voice Recognition Goes Wrong: YouTube Videos Can Say “Ok Google”
YouTube videos are like today’s candid camera: they can be fun, educational, and, sometimes, a window into someone else’s most...
Where’s the Truth Online? How to Build Your Family’s Digital Discernment
Note: This is Part I of a series on equipping your family fight back against fake news online. Fake news...
