Featured Blogs
The Top 5 Scariest Mobile Threats
Scary movies are great. Scary mobile threats, not so much. Ghosts, killer clowns, and the creatures can stir up all...
The Top 5 Ways To Protect Your Family From Scams
Scams are big business for cybercriminals. In 2023, Aussies lost a whopping $2.7 billion in scams. Barely a week goes...
The Top Tax Scams of 2024
While last-minute tax filers stare down the clock, scammers look for easy pickings. Tax scams are in full swing as...
The Top Technology Takeaways From CES 2020
Another Consumer Electronics Show (CES) has come and gone. Every year, this trade show joins practically everyone in the consumer...
The Tradeoff Between Convenience and Security – A Balance for Consumers & Manufacturers
This week McAfee Advanced Threat Research (ATR) published new findings, uncovering security flaws in two popular IoT devices: a connected...
The Trends & Challenges Facing The Internet Of Things
This blog post was written by Nick Viney. The Internet of Things, or IoT, is now commonplace in society today....
The Twin Journey, Part 1
Summary and Introduction: The recent changes in Windows 10, aiming to add case sensitivity (CS) at directory level, have prompted...
The Twin Journey, Part 2: Evil Twins in a Case In-sensitive Land
In the first of this 3-part blog series, we covered the implications of promoting files to “Evil Twins” where they...
The Twin Journey, Part 3: I’m Not a Twin, Can’t You See my Whitespace at the End?
In this series of 3 blogs (you can find part 1 here, and part 2 here), so far we have...
The Uber Data Breach: What Consumers Need to Know
Ride-sharing apps are one of the most successful innovations of the modern digital age. Practically everyone who has a smart...
The Ultimate CyberParenting Hack – Managing Your Family’s Cybersafety with your Wi-Fi
Managing your family’s cybersafety can often feel overwhelming. But one thing I have learnt in my 22 years of parenting...
The Ultimate Guide to Safe Sharing Online
We live in a world that thrives on digital connectivity. According to We Are Social, Canadians are now spending half a day more...
The Ultimate Holiday Shopping Guide
The holidays are almost here! That means it’s time to start making your list and checking it twice. To help prepare you for...
The VORACLE OpenVPN Attack: What You Need to Know
Many of us know that using a VPN (Virtual Private Network) adds an extra layer of security to our Wi-Fi...
The Wearable Future Is Hackable. Here’s What You Need To Know
Quick mental math challenge: How many Apple Watches can you buy with $118 billion dollars? If you guessed around 296...
The Week That Was In Internet History
From the wheel to the internet, we have come a long way in terms of technological progress. While the invention...
The What, Why, and How of AI and Threat Detection
There are more online users now than ever before, thanks to the availability of network-capable devices and online services. The internet...
The Wild West of AI: Do Any AI Laws Exist?
Are we in the Wild West? Scrolling through your social media feed and breaking news sites, all the mentions of...
The World’s Most Deepfaked Celebrities Revealed
Scammers most targeted celebrities by deepfake scams. Learn why these stars are exploited and how to detect and protect yourself from digital fraud.
The Year That Was – Cybersecurity Takeaways From 2018
So, what was 2018 like for you? Just another year, a whirlwind of happiness and heartbreaks, or a momentous one...
The ‘Beginners Guide To IoT’
This blog post was written by Nick Viney. You’ve probably heard the term ‘smart’ being placed in front of everyday...
The “Nasty List” Phishing Scam Is out to Steal Your Instagram Login
How often do you check your social media accounts? According to a recent study, internet users spend an average of...
Thelma – The Real-Life Voice Scam That Made It into the Movies
This has to be a first. Something from our blogs got made into a movie. We’re talking about voice scams,...
These Cute Teddy Bears Have Been Recording Your Kids
When we think of cyberhacks, we often think of criminals trying to break into a network of important information protected...
Think Before You Click: EPI PDF’s Hidden Extras
Authored by: Anuradha & Prabudh PDF converting software can be super helpful. Whether you’re turning a Word document into a...
Think That Party Invite Is Real? Fake E-Vite Scams Are the New Phishing Trap
It looks harmless enough. A digital party invitation lands in your inbox or phone. You click to see the details....
Think Twice Before Trusting These 14 Android Apps with Your Login Information
In life, there are a handful of people that each of us truly trust – and can confide in fully....
