The Future of Mobile: Trends from Mobile World Congress 2021
Today we wrap up Mobile World Congress (MWC) 2021. Whether you joined online or attended the hybrid conference in person, one...
How 2020 Helped Parents Understand Their Kids’ Digital Lives
How 2020 Helped Parents Understand Their Kids’ Digital Lives Over the last 12 months, technology has featured in our lives...
How 2020 Has Shaped The Way We Live Our Lives
How 2020 Has Shaped The Way We Live Our Lives I’ve had such a busy morning! I’ve hunted down my...
How To Protect Yourself from SMiShing Attacks
SMiShing is a deceptive practice where scammers send fraudulent text messages masquerading as reputable institutions, aiming to dupe recipients into clicking on a link, calling a number, or providing sensitive personal information. The risk with SMiShing is that mobile users tend to trust their SMS messages more than their emails, ...
How Cybercriminals Are Shopping for Personal Data This Black Friday
While the majority of us look forward to Black Friday and Cyber Monday for the best deals, there’s another group...
Christmas Shopping 2020
How To Stay Safe While Shopping Online This Holiday Season I’m pleased to report that I’ve achieved a number of...
How To Keep Your Data Private Online
Whether data gets collected for advertising purposes, or to generate profit by selling data to others, your privacy has a price tag on it. Yet you have some say in all this. You can take several steps that can minimize the data trail that you create by going online. Put ...
Understanding the Risks of Using an Android Device
Android has, over time, become a popular target for hackers. Recently, McAfee Labs™ found that all new forms of malicious mobile software were solely designed to exploit vulnerabilities in the Android operating system.
5 Ways to Safeguard Your Child’s Instagram Bio
Keeping your child safe online is a growing concern for many parents. However, there are ways you can help safeguard your child’s Instagram bio and enhance their online safety. Here are 5 tips to consider.
Beware of Malicious Mobile Apps
With the surge in the usage of mobile phones, there has been a concurrent increase in malicious activities targeting these devices. One common technique used by hackers is to corrupt legitimate applications. Android devices, in particular, see increases in malware targeting mobile phones year by year.