Lets Have “The Talk” About the Internet: 7 Conversation-Starters for Staying Safer Online
It’s Time to Have “The Talk” About the Internet: 7 Conversation-Starters for Staying Much Safer Online With Safer Internet Day upon us, it’s time to have “The Talk.” The internet talk, that is. What’s the internet talk? It’s a candid conversation about how safe we’re really being when we go online, as opposed to how […] more…Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) Seems like we always have a connected device somewhere within arm’s reach, whether it’s a smartphone, laptop, tablet, a wearable, or some combination of them all. In a way, we bring the internet along with us nearly wherever we go. Yet there’s something […] more…Special Delivery: Criminals Posing as Amazon Are Out to Steal User’s Data
One of the joys of online shopping is instant gratification – your purchases arrive on your doorstep in just a few days! Unfortunately, consumers aren’t the only ones taking advantage of this convenience – hackers are also using it to trick users into handing over money or data. Recently, AARP recounted several scams where cybercriminals posed as Amazon’s customer […] more…Online Banking—Simple Steps to Protect Yourself from Bank Fraud
Online Banking—Simple Steps to Protect Yourself from Bank Fraud Even if you’re not big on online banking, online banking is big on you. Online banking is well on its way to becoming a cornerstone of the banking experience overall. More and more transactions occur over the internet rather than at a teller’s window, and nearly […] more…Medical Care #FromHome: Telemedicine and Seniors
Medical Care From Home: Telemedicine and Seniors For weeks and even months now, millions of us have relied on the internet in ways we haven’t before. We’ve worked remotely on it, our children have schooled from home on it, and we’ve pushed the limits of our household bandwidth as families have streamed, gamed, and conferenced […] more…Entertainment #FromHome: How to start your own podcast
How to start your own podcast Start your own podcast? Why not? Instead of streaming someone else’s show, maybe it’s time to create one of your own. And a fine time to start a podcast it is. Podcasting once took a bit of effort to get into. The recording software, the hosting, and the equipment […] more…Internet Safety Begins with All of Us
Internet Safety Begins with All of Us Now’s the time to pause for a moment and consider just how important the internet is to us. Not just any internet. A safer internet. June marks Internet Safety Month. Why June? The original thought was that the onset of summer sees more kids online, making it an […] more…Date Night #FromHome Ideas
Date Night #FromHome ideas “So, what movie should we watch?” The dreaded question. Twenty minutes of “mmm, maybe” later, you settle on an old episode of “The Office” and call it good. If that sounds a little too familiar, this post is for you. With so many of us having date night at home, now […] more…Consumers want a fully connected life – but at what cost?
Convenience has always, and will always be king. That’s why it’s no surprise that the average person is collecting connected devices left and right and is expected to own 15 connected devices by 2030. While they vary from person to person, recent research shows that the most popular connected devices tend to be smart meters, […] more…The Top Technology Takeaways From CES 2020
Another Consumer Electronics Show (CES) has come and gone. Every year, this trade show joins practically everyone in the consumer electronics industry to show off the latest and greatest cutting-edge innovations in technology. From bendable tablets to 8k TVs and futuristic cars inspired by the movie “Avatar,” CES 2020 did not disappoint. Here are a […] more…Less is More: 5 Ways to Jumpstart a ‘Digital Minimalist’ Mindset
Editor’s Note: This is part II of a series on Digital Minimalism in 2020. Is this the year you rethink and rebuild your relationship with technology? If so, embracing digital minimalism may be the most powerful way to achieve that goal. We learned last week in our first post on this series tht digital minimalism […] more…Ransomware: The Digital Plague that Still Persists
Ransomware began its reign of cyber terror in 1989 and remains a serious and dangerous threat today. In layman’s terms, ransomware is malware that employs encryption to lock users out of their devices or block access to critical data or files. A sum of money, or ransom, is then demanded in return for access to […] more…FIN6 Compromised E-commerce Platform via Magecart to Inject Credit Card Skimmers Into Thousands of Online Shops
We discovered that the online credit card skimming attack known as Magecart or E-Skimming was actively operating on 3,126 online shops. Our data shows that the attack started on September 7, 2019. All of the impacted online shops are hosted on the cloud platform of the e-commerce service provider “Volusion,” one of the top e-commerce […] more…How Visiting a Trusted Site Could Infect Your Employees
The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an exploitation of multiple iPhone vulnerabilities using websites to infect final targets. The key concept behind this type of attack is the use of trusted websites as an intermediate platform to attack others, and it’s defined as a watering hole […] more…Beware of Back-To-School Scams
These days it seems that there is a scam for every season, and back-to-school is no different. From phony financial aid, to debt scams, and phishing emails designed to steal your identity information, there are a lot of threats to study up on. Of course, many of these scams are just different twists on the […] more…How To Help Your Kids Manage Our ‘Culture of Likes’
As a mum of 4 sons, my biggest concerns about the era of social media is the impact of the ‘like culture’ on our children’s mental health. The need to generate likes online has become a biological compulsion for many teens and let’s be honest – adults too! The rush of dopamine that surges through […] more…More information
- Targeted Attack Protection via Network Topology Alteration
- BMC Firmware Vulnerabilities Expose OT, IoT Devices to Remote Attacks
- Almost all US networks can be hacked
- Serious Vulnerability in Microsoft Remote Desktop
- Spamdexing: What is SEO Spam & How to Remove It
- CISA Warns of FXC Router, QNAP NVR Vulnerabilities Exploited in the Wild
- Here’s What You Need to Know About Your Data Privacy in 2020
- Resolved: Planned service disruption to the Data Center Firewall service
- Read the 200,000 Russian Troll tweets Twitter deleted
- Microsoft Internet Explorer CVE-2015-1665 Remote Memory Corruption Vulnerability