5 Red Flags of Identity Theft
An estimated 11.7 million people are victims of identity theft each year. It is a growing crime and it is expected to grow more with each passing year.There is a big demand for stolen identities in the...
View ArticleDefCon 24- Hacking to Make the World a Better Place
Did you know that an attacker can flood your house via the water dispenser on your connected refrigerator? Or that bluetooth enabled locks can be picked from ¼ of a mile away using radio frequencies? I...
View ArticleHow To Talk to Your Kids About Cyberbullying
Cyberbullying is not very different from the ill reputed bullying that happens in the school yard. It has the same psychological and social implication that leaves the formative minds of children...
View ArticlePop-Cultural Relevance of Hacking in Today's World
When hacking was first introduced in film and television, it was nowhere near as prevalent as it is today. The threat landscape was years away from becoming what it is now, so hacking and cybercrime...
View ArticleWhat Is VoIP?
VoIP is an acronym for “voice over Internet Protocol.” That means any phone call that takes place over the Internet, rather than on landlines or through mobile towers. This alternative to traditional...
View ArticleInternet Acronyms and Slang Your Teen is Using, and What it all Means
Seem like Greek to you? Well, you’re not alone. Kids these days have evolved into creating their own language to communicate with each other. Between undecipherable anagrams, to strange slang terms,...
View ArticleKeep Your Home Wi-Fi Safe in 7 Simple Steps
It is beginning to feel like the Internet is a basic necessity for existence in the 21st century. With all our devices connected to the Internet, we have an indescribable physical mobility that leads...
View ArticleCan a mobile phone battery track you?
With this little known exploit, a mobile phone’s battery life can actually be used to track online behavior. Security researchers have found that the battery status API of mobile devices can be used to...
View ArticleThe Most Common Threats Children Face Online
Children are among the most active Internet users, and are unfortunately subject to a number of threats. If you allow your children to spend considerable time surfing the web, it’s important to know...
View Article轻松享受数字生活:有效保护家人在线安全的 10 大互联网安全规则
Children today can access more information than any generation before. Because of the Internet they now have a wealth of information that can enrich their lives in new and wondrous ways. But the...
View ArticleHow a VPN Can Help Hide Your Search History
Most of us use search engines on a daily basis. It’s become automatic. If we don’t know what something is, or hear a word that we can’t define, we go online and type the term into our favorite search...
View ArticleCan the Elections Get Hacked?
The security of electronic voting machines has been the subject of scrutiny, just before the November U.S. presidential elections. Are they secure? Are they anonymous? And if the answer is yes, how can...
View ArticleAn Indepth Look At Cyberbullying and How it's Done
The advancements in technology have made Internet communications a natural way of life. Especially to children, since this is a technology they were born into instead of adopting it, like adults have...
View ArticleThe Basic Steps to Online Safety and Security- NCSAM Week 1
Since our physical world has become so integrated with our technology, it’s not as easy as to protect it back when all we had to worry about was our computers and laptops. However, in this day and age,...
View ArticleExploring the Deep Web
There are multiple “layers” to the Internet that you may not be aware of. The first, or top layer is called the surface web, and it is the part of the web that is crawled by search engines. That’s the...
View ArticleOnline Harassment: Halting a Disturbing 'New Normal'
A new survey uncovers the prevalence of harassment against men in the online world and suggests ways to combat it.On the face of it, Gold Coast Titans National Rugby League (NRL) player Jarryd Hayne...
View ArticleFrom the Break Room to the Boardroom: Creating a Culture of Cybersecurity in...
Whether you own a small business or a big one, you live in a world where cybersecurity is of paramount importance. Big business, small business, academic institutions, government agencies, nonprofits…...
View ArticleSafe Online Shopping Tips for the Holiday Season
The shopping season is coming and if you’re a modern consumer you’re going to be doing at least some of your holiday shopping online. The problem is that some of the most dangerous places on the web...
View ArticleHow To Recognize and Protect Yourself from Cybercrime
Cybercrime is a growing threat in 2016. You might think that the only form of cybercrime you have to worry about is hackers stealing your financial information. Unfortunately there are far more...
View ArticleThe Smarter Home: How to Create a Smart Home
Internet of Things gadgets aren’t just for toys for techies. They are actually more accessible by cost and ease of use, and people are finding convenience in creating a “smart home” with connected...
View Article