Featured Blogs
What It Takes for Security in the Internet of Things
The next time you buy a car, chances are, it’ll be connected to your phone. Maybe your next refrigerator, thermostat,...
What Is the CurveBall Bug? Here’s What You Need to Know
Today, it was announced that researchers published proof of concept code (essentially, an exercise to determine if an idea is a reality) that exploits a recently patched vulnerability in...
What is ‘Covert Redirect’ and Should You be Worried?
When Heartbleed struck in April, it shook the Internet to its core in an almost literal sense: the vulnerability, which...
What is Wardriving?
Wireless networks have certainly brought a lot of convenience to our lives, allowing us to work and surf from almost...
What is Typosquatting?
Typosquatting, also known as URL hijacking, is a form of cybersquatting (sitting on sites under someone else’s brand or copyright)...
What is the Dark Web? Everything You Need to Know
You open up your laptop and check the daily news. You see a headline stating that one of your favorite online retailers was breached and that thousands of...
What is the Dark Web?
The dark web. The name raises all kinds of questions. What is the dark web, really? Where is it? Can...
What is the Cloud?
You’ve probably heard of people storing information in “the cloud,” but what does that really mean, and is it safe...
What Is Tailgating in Cybersecurity and How to Protect Yourself
Whether you’re spending time on the web or working in the office, you want peace of mind knowing that you...
What Is Synthetic Identity Theft?
It’s too bad cybercriminals don’t funnel their creativity into productive pursuits because they’re constantly coming up with nefarious new ways...
What is Spyware?
Spyware. If the name sounds creepy and invasive, that’s because it is. The thought of someone virtually looking over your...
What is Spam?
Everyone’s heard of spam as it pertains to emails. Spam isn’t necessarily a malicious message designed to trick you into...
What is Sora and What Does It Mean for Your Personal Internet Security?
Imagine a tool that can transform text into captivating videos, bridging the gap between imagination and reality by creating videos...
What is Social Engineering?
In the realm of cybersecurity, there is one vulnerability that is often overlooked – the human element. While firewalls, encryption,...
What Is Smishing? Here’s How to Spot Fake Texts and Keep Your Info Safe
Your phone buzzes. You hope it’s a reply from last night’s date, but instead you get an entirely different swooping...
What Is Smishing and Vishing, and How Do You Protect Yourself?
Smishing and vishing are scams where criminals attempt to get users to click a fraudulent link through a phone text...
What Is Smishing and Vishing, and How Do You Protect Yourself
Smishing and vishing are scams where criminals attempt to get users to click a fraudulent link through a phone text...
What is Shoulder Surfing?
The next time you’re in a public place and glued to your smartphone or tablet — whether it’s at the...
What Is Script-Based Malware? How to Stay Protected from This Cyberthreat
When you hear the word “script,” you probably think of either a movie script, or JavaScript. Though most of us...
What is Scareware?
When it comes to making us fall for their scams, cybercriminals have a number of tricks up their sleeves. One...
What is Roblox and is It Safe for Kids?
If you have a tween or teen, you’ve likely heard a lot of excited chatter about Roblox. With a reported 150 million users, there’s a good chance your child has the Roblox site on their phone, tablet, PC, or Xbox. However, as with all digital destinations, the fun of Roblox ...
What is Ransomware?
Imagine that you want to pull up a certain file on your computer. You click on the file and suddenly...
What Is Ransomware and Who Does It Target?
Lockouts—they happen. We forget our keys, we can’t remember our passwords—and sometimes, someone else locks us out. And in the...
What Is Quishing? How QR Code Scams Work and How to Avoid Them
You thought you were scanning a menu. Or paying for parking. Or checking a package notice taped to your door....
What is Phishing? Find Out with Gary Davis on the Latest Episode of Tech Nation
Gary Davis is now a regular contributor on the Tech Nation podcast! In this episode, Gary Davis educates that phishing...
What Is Phishing?
So much of our personal and professional lives are online — from online banking to connecting with friends and family...
What is Pharming?
. For a lot of kids today, mash-ups are all the rage—whether it’s combining two videos, two songs, or two...
