February 14, 2019 - All the recent news—from Facebook's Cambridge Analytica snafu to various abuses of Twitter vulnerabilities—has you wondering: Should I delete myself from social media? We provide advice and links on how to tighten security if you want to cool down, or, if you're ready to go nuclear, delete yourself permanently.
January 18, 2019 - In what's being dubbed one of the largest data dumps in history, Collection 1 contains the data of over 770 million people. But is it really as bad as it sounds? We take a closer look and let users know what to do if their info is caught up in the mix.
December 26, 2018 - In part two of our blog assessing the security of a portable router, we will acquire the tools and equipment to make a copy of the firmware on our target router so that we can assess whether there are any vulnerabilities.
December 10, 2018 - Phishing is more problematic on smartphones than on desktops. Not only that, approaches to handling phishing attacks on mobile are quite different because their techniques are also different. So, how can users sniff out a mobile phish? Let us count the ways.
November 9, 2018 - A quick introduction to Process Hacker which is a powerful tool that can be used for troubleshooting, debugging, and reverse engineering.
October 11, 2018 - As we dive headfirst into National Cyber Security Awareness Month, it seems only fitting to discuss ways to stay on top of cybersecurity news. But what if following along makes you feel a little overwhelmed? Try these six methods of information-gathering to brush up on your cybersecurity know-how without losing your mind.
September 11, 2018 - We take a look at some of the safe ways to waste a spammer's time, whether by email or telephone.
July 15, 2018 - While Amazon is poised for its fourth annual Prime Day, the e-commerce giant’s flash sales event for Prime members, shoppers on the hunt for deals may get more than they bargained for—malware. Here's what you need to keep in mind to stay secure while you shop.
July 10, 2018 - What are the bumps in the road you can expect and avoid when setting up a threat intel program for your business?
June 28, 2018 - Parents with good intentions may not realize that by sharing photos of their children on social media, they have already created their online presence. The good news is that their online reputation can be managed, and you can teach them how to do it, too.