Featured Blogs
What is Browser Hijacking?
Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed or check out The...
What Is Credential Phishing?
You guard the keys to your home closely, right? They have their own special spot in your bag or in...
What is Criminal Identity Theft?
Identity theft gets all kinds of buzz in the news. It’s not hard to see why—in 2012, over 16.6 million...
What is disk cleanup and does it remove viruses?
What is Disk Cleanup and does it remove viruses? It happens. You’re in the middle of a computing task, and...
What is Doxing?
Imagine someone putting your personal information out online for thousands of strangers to see—your home address, phone number, even details...
What is Encryption?
Encryption is the science of encoding and decoding secret messages. It began as cryptography—the ancient Greeks used it to protect...
What Is Generative AI and How Does It Work?
It’s all anyone can talk about. In classrooms, boardrooms, on the nightly news, and around the dinner table, artificial intelligence...
What is GPS spoofing?
Global positioning system (GPS) technology is now the standard way for travelers to efficiently get from point A to point...
What Is Identity Theft and How Do You Recover From It?
The internet is a big place. While it’s changed the world for the better — making our daily lives that...
What Is Incognito Mode and How Safe Is It?
The internet makes it easy to get a lot done, but not all of it needs to be public. That’s...
What Is Internet Security?
Internet security is a broad term that refers to a wide range of tactics that aim to protect activities conducted...
What Is Machine Learning?
What do self-driving cars and interactive speakers have in common? Both utilize something called “machine learning.” This is when we...
What Is Malvertising and How Do You Avoid It?
Smartphones and personal computers have enhanced our lives in so many ways that it can be hard to even imagine...
What is Malware?
What is malware? A dictionary-like definition is “malicious software that attacks computers, smartphones, and other connected devices.” In fact, “malware”...
What Is Mshta, How Can It Be Used and How to Protect Against It
The not-so Usual Suspects There is a growing trend for attackers to more heavily utilize tools that already exist on...
What is Pharming?
. For a lot of kids today, mash-ups are all the rage—whether it’s combining two videos, two songs, or two...
What Is Phishing?
So much of our personal and professional lives are online — from online banking to connecting with friends and family...
What is Phishing? Find Out with Gary Davis on the Latest Episode of Tech Nation
Gary Davis is now a regular contributor on the Tech Nation podcast! In this episode, Gary Davis educates that phishing...
What Is Ransomware and Who Does It Target?
Lockouts—they happen. We forget our keys, we can’t remember our passwords—and sometimes, someone else locks us out. And in the...
What is Ransomware?
Imagine that you want to pull up a certain file on your computer. You click on the file and suddenly...
What is Roblox and is It Safe for Kids?
If you have a tween or teen, you’ve likely heard a lot of excited chatter about Roblox. With a reported 150 million users, there’s a good chance your child has the Roblox site on their phone, tablet, PC, or Xbox. However, as with all digital destinations, the fun of Roblox ...
What is Scareware?
When it comes to making us fall for their scams, cybercriminals have a number of tricks up their sleeves. One...
What Is Script-Based Malware? How to Stay Protected from This Cyberthreat
When you hear the word “script,” you probably think of either a movie script, or JavaScript. Though most of us...
What is Shoulder Surfing?
The next time you’re in a public place and glued to your smartphone or tablet — whether it’s at the...
What Is Smishing and Vishing, and How Do You Protect Yourself
Smishing and vishing are scams where criminals attempt to get users to click a fraudulent link through a phone text...
What Is Smishing and Vishing, and How Do You Protect Yourself?
Smishing and vishing are scams where criminals attempt to get users to click a fraudulent link through a phone text...
What Is Smishing? Here’s How to Spot Fake Texts and Keep Your Info Safe
Your phone buzzes. You hope it’s a reply from last night’s date, but instead you get an entirely different swooping...