Data and device security for domestic abuse survivors

Many domestic abuse survivors need help before stalkerware strikes. Here, we give basic advice on device security and protecting sensitive data.

Read more

Mobile Menace Monday: Dark Android Q rises

The Android Q operating system is being developed with privacy and security in mind. We take a look at both, examining new features intended for giving users better control of their devices and data.

Read more

A week in security (April 8 – 14)

A roundup of news stories from April 8–14, including Baldr, medical management apps, an Android password stealer, and new sextortion scams.

Read more

Government shutdown impacts .gov websites, puts Americans in danger

Today, TechCrunch posted a concerning story about the shutdown and most importantly, they covered the reporting of NetCraft, a U.K. internet service company, about how numerous US government websites are now inaccessible due to expired security certificates. This is going to be a quick post to help explain what happened and more importantly, how cyber criminals will use this situation to their advantage.

Read more

Smart speakers: Christmas treat or lump of coal?

If you’re interested in buying smart speakers this Christmas, you may be wondering how much of a privacy problem they really are. We take a look at this popular holiday present and separate the hype from the real issues at hand.

Read more

Google logins: JavaScript now required

Google now requires users to enable JavaScript before logging in for extra security measures. But wait, hasn’t JavaScript been used in cyberattacks? We take a look at the impact of Google’s decision.

Read more

How to tighten security and increase privacy on your browser

Is your browser secure and private enough by design or do you need to worry about security, privacy, fingerprinting, ads, and cookies yourself?

Read more

Removing the jam in your printer security

We take a look at printer security, an oft-neglected aspect of locking down an organization’s network.

Read more

How to build your own motion-activated security camera

Attention makers! Are you looking for a challenging project that not only gets your gears grinding but helps to keep you secure while traveling? Welcome to the build-your-own security camera tutorial.

Read more

The many faces of omnichannel fraud

There’s a new kind of fraud out there, and it’s after organizations that have embraced omnichannel, a strategy that focuses on improved user experience. We take a look at what omnichannel is, the kinds of fraud that can affect businesses using this approach, and how they can protect themselves—and their clients.

Read more

Select your language