Featured Blogs
Why Are Some Countries Banning TikTok?
Waiting in the checkout line. Waiting to fall asleep. Waiting for your boring work call to finally end. When you...
Make Your Smart Home a Secure Home Too: Securing Your IoT Smart Home Devices
It’s only a smart lightbulb. Why would anyone want to hack that? Great question. Because it gets to the heart...
Three Reasons You Need a VPN
You know what a VPN is, but the question remains—why do you need a VPN? There’s one good reason. Your...
Anyone Can Try ChatGPT for Free—Don’t Fall for Sketchy Apps That Charge You
Anyone can try ChatGPT for free. Yet that hasn’t stopped scammers from trying to cash in on it. A rash...
How to Protect Your Identity Before You Leave on Vacation
Your summer vacation is approaching quickly! You can’t wait to take time away from your responsibilities, jump out of your...
How To Bank Safely Online
If you’ve got teens, then no doubt you’ve received the SOS texts. ‘Mum, I need a haircut, can you just...
The Best Way to Stay Safe While Gaming
When my boys were in the thick of their teen years (pre pandemic), bad mouthing their seeming gaming obsession was...
How To Improve Your Online Security
With the number of cyber threats and breaches dominating the headlines, it can seem like a Herculean task to cover...
How to Close Online Accounts for Savings and Security
How many online accounts do you have? Dozens? Hundreds? You probably have more than you think, and deleting a bunch...
The Future of Technology: AI, Deepfake, & Connected Devices
The dystopian 2020s, ’30s, and ’40s depicted in novels and movies written and produced decades ago blessedly seem very far...
The Dangers of Artificial Intelligence
Over the decades, Hollywood has depicted artificial intelligence (AI) in multiple unsettling ways. In their futuristic settings, the AI begins...
Social Engineering—The Scammer’s Secret Weapon
Social engineering. It’s a con game. And a con game by any other name stings just as badly. Like any...
3 Reasons to Think Twice About Enabling Location Sharing
Do you remember the days of printing out directions from your desktop? Or the times when passengers were navigation co-pilots...
CLOP Ransomware exploits MOVEit software
Authored by: Abhishek Karnik and Oliver Devane You may have heard recently in the news that several organizations, including banks,...
Parent’s Guide: 8 Ways to Help Your Teen Combat Distracted Driving
Read this statement, then read it again: Just five distracted seconds at 55 mph is equivalent to driving the length...
The Price of Cybercrime: Protecting the Business You’ve Built from Hacks and Attacks
Cybercrime has a price. One that more and more business owners find themselves paying. The costs push well into the...
Blockchain Basics: What’s Blockchain Technology and How Might It Change Our Lives?
What’s blockchain technology? The term gets bandied about often enough, but it doesn’t always get the explanation it deserves. Understanding...
How To Protect Your Digital Estate
While we’re enjoying all the good things in our digital lives—our eBooks, movies, email accounts, social media profiles, eBay stores,...
What Is Smishing? Here’s How to Spot Fake Texts and Keep Your Info Safe
Your phone buzzes. You hope it’s a reply from last night’s date, but instead you get an entirely different swooping...
How to Protect Your Family From AI Scams
AI scams are becoming increasingly common. With the rise of artificial intelligence and technology, fraudulent activity is becoming more sophisticated...
How to Protect Your Privacy From Generative AI
With the rise of artificial intelligence (AI) and machine learning, concerns about the privacy of personal data have reached an...
How to Protect School Children From Deep Fakes
Deep fakes are a growing concern in the age of digital media and can be extremely dangerous for school children....
Be Mindful of These 3 AI Tricks on World Social Media Day
Happy World Social Media Day! Today’s a day about celebrating the life-long friendships you’ve made thanks to social media. Social...
iPhone Update — Apply It Now If You Haven’t Already
Apple recently issued an urgent iPhone update, iOS version 16.5.1. If you haven’t updated yet, you should. Owners of iPads...
How to Protect Yourself From Tailgating Attacks
Holding the door for someone might open the way to a cyberattack. For anyone who works in a secure building...
Scammers Love Barbie: Fake Videos Promote Bogus Ticket Offers That Steal Personal Info
Turns out, scammers really love Barbie. As Barbie makes her debut on the big screen, scammers are aiming to cash...
Android SpyNote attacks electric and water public utility users in Japan
Authored by Yukihiro Okutomi McAfee’s Mobile team observed a smishing campaign against Japanese Android users posing as a power and...