Featured Blogs
Uber Data Breach and How to Protect Your Info
The Latest on the Uber Data Breach and Protecting Your Info You may have spotted the news last week that...
Can Your Wearable Health Monitors Be Compromised?
More senior adults are taking advantage of the array of wearable technology that helps them stay connected to healthcare providers and monitor their physical health and safety. But that newfound convivence comes with risk and, for many, the genuine fear...
T-Mobile’s data breach exposes the personal data of 40 million
T-Mobile, the popular US mobile phone service provider, recently confirmed a data breach affecting 7.8 million current customers and 40 million records from past or prospective customers. The...
4 Viral Apps Risking Your Personal & Smartphone Security
Mobile phones have gone through an incredible transformation since their inception in the 1970s. Now, the sheer number of applications is dizzying, as are their...
Younger, But Not Savvier: 3 Cybersecurity Threats Plaguing Millennials
Surprise! Just because you’re a Millennial or Gen Zer doesn’t mean you’re savvier when it comes to technology. Especially when it comes...
Back-to-School: Privacy Worries in a Remote Learning World
As the new school year gets underway, many students will be returning to the classroom in-person, while others will opt...
6 Tips for a Safer and Easier Telemedicine Visit
We’ve all been there. It’s the middle of the night and you wake up to a sad and sniffly kiddo...
The Rise of Deep Learning for Detection and Classification of Malware
Co-written by Catherine Huang, Ph.D. and Abhishek Karnik Artificial Intelligence (AI) continues to evolve and has made huge progress over the last decade. AI shapes our daily lives. Deep learning is a subset of techniques in AI that...
Chipotle’s Marketing Account Hacked: Protect Yourself From Phishing Lures
Over the past few years, food delivery apps have made it easy for people to get their favorite cuisines brought...
XLSM Malware with MacroSheets
Written by: Lakshya Mathur Excel-based malware has been around for decades and has been in the limelight in recent years. During the second half of 2020, we saw...