Featured Blogs
What Is Ransomware and Who Does It Target?
Lockouts—they happen. We forget our keys, we can’t remember our passwords—and sometimes, someone else locks us out. And in the...
What is Phishing? Find Out with Gary Davis on the Latest Episode of Tech Nation
Gary Davis is now a regular contributor on the Tech Nation podcast! In this episode, Gary Davis educates that phishing...
What Is Phishing?
So much of our personal and professional lives are online — from online banking to connecting with friends and family...
What is Pharming?
. For a lot of kids today, mash-ups are all the rage—whether it’s combining two videos, two songs, or two...
What Is Mshta, How Can It Be Used and How to Protect Against It
The not-so Usual Suspects There is a growing trend for attackers to more heavily utilize tools that already exist on...
What is Malware?
What is malware? A dictionary-like definition is “malicious software that attacks computers, smartphones, and other connected devices.” In fact, “malware”...
What Is Malvertising and How Do You Avoid It?
Smartphones and personal computers have enhanced our lives in so many ways that it can be hard to even imagine...
What Is Machine Learning?
What do self-driving cars and interactive speakers have in common? Both utilize something called “machine learning.” This is when we...
What Is Internet Security?
Internet security is a broad term that refers to a wide range of tactics that aim to protect activities conducted...