Featured Blogs
Sextortion – What Every Parent Needs To Know
Imagine this. You’re 15, feeling unsure about yourself in the world, possibly even a little lonely. One day, a pretty...
Sex Sells: Looking at Android Adult Adware Apps
Advertising is one of the primary methods to generate money from mobile devices. Ads can be displayed in the browser...
Seven Windows Wonders – Critical Vulnerabilities in DNS Dynamic Updates
Overview For the March 2021 Patch Tuesday, Microsoft released a set of seven DNS vulnerabilities. Five of the vulnerabilities are...
Seven Android Apps Infected With Adware, Downloaded Over 500,000 Times
The amount we use our apps and the amount of apps we use has shown no signs of slowing. And...
Setting Up Parental Controls in TikTok, Instagram & Snapchat
It’s a question we get a lot from parents: “How can I keep my kids safe when they are constantly...
Setting Up HTTPS for Google App Engine Applications
Thursday, we posted advice on creating a custom domain name for an application developed with Google’s App Engine. In this...
Setting the Stage for Your Video Interview: Job Hunting From Home
If you’ve lined up your first video interview, or just new to the whole idea in general, how do you...
Service Provider [24]7.ai Breached, Leaked Customer Data from Delta Airlines, Sears, Kmart
A huge part of modern-day customer service is the chat functionality, which allows customers to converse easily with representatives of...
Server-Side Request Forgery Takes Advantage of Vulnerable App Servers
This blog was written by Kunal Garg. Server-side request forgery is an attack in which an attacker can force a...
Sensitive Data on 3 Million Facebook Users Potentially Exposed by Suspended App
From Facebook to Twitter and now back to Facebook – the past few months have seen some of the most...
Send Your Kids Back to School with Mobile Safety in Mind
The days are getting shorter and your bags are (finally) unpacked from the annual family vacation. Summer is officially coming...
Send Your Kids Back to School with Cybersecurity Knowledge
Summer vacation is on and chances are that your kids are spending time indoors as the scorching sun makes it...
Selfies with Boarding Passes: A Silent Cybersecurity Risk
Who doesn’t look forward to their next vacation or holiday? With a simple plane ticket, you can be off to...
Self-Signed Certificates Can Be Secure, So Why Ban Them?
This blog was co-written by Brook Schoenfield and Ramnath Venugopalan. In many organizations the use of self-signed certificates is forbidden...
Seeking Reconnection: Internet Usage and the Return to Travel
Even as the internet kept us connected with family and friends during the pandemic, people remain understandably eager to reconnect in person as vaccines roll...
Seeing Through Darkleech Obfuscation: a Quick Hack to Iframes
This blog post was written by Kalpesh Mantri. Darkleech is an Apache module on the dark web that distributes malware....
See Yourself in Cyber – Five Quick Ways You Can Quickly Get Safer Online
With “See Yourself in Cyber” as the theme for this year’s Cybersecurity Awareness Month, the focus is on you with...
Security, By the Numbers, Is Big
When you quantify security, the numbers are big and plentiful. The reality of data being compromised is staggering, but we...
