Security

Posted by | June 26, 2020
The anatomy of a phish

Phishing is the most prolific category of cyber scam. Others include romance scams, mugged in London scams, advance fee frauds and many more. Most scams seek to part you from your money...

Continue Reading
Posted by | April 26, 2020
Tips for Windows 10 Security

The good news is there is no lack of privacy settings in Windows 10. In fact, there are so many privacy settings that some are unknown to most users! The bad...

Continue Reading
Posted by | April 21, 2020
Contact Tracing Apps

Several countries — and now individual US states — are planning or have rolled out their smartphone-based contact tracing apps. These apps are designed so that local health agencies can figure...

Continue Reading
Posted by | April 17, 2020
Secure your iPhone

In the beginning, Apple products stood high, wide, and handsome in the face of cyberattacks. Average hackers found it nearly impossible to crack the company’s proprietary software, and an Apple product’s attack surface was...

Continue Reading
Posted by | April 9, 2020
Tips for Parents

We continue our series from the Digital Sanity Summit with advice from the Council of Europe’s own Dr. Elizabeth Milovidov, law professor and eSafety consultant. Dr. Milovidov is a mother...

Continue Reading
x Logo: Shield
This Site Is Protected By
Shield