Limit Who Can See Your Activity on Social Media

Limit Who Can See Your Activity on Social Media

For scammers, there’s a lot to like about social media. It’s a low-cost way to reach billions of people from anywhere in the world. It’s easy to manufacture a fake…
Prevent Ransomware Attacks Before They Happen

Prevent Ransomware Attacks Before They Happen

Most people think about ransomware when the attack has already happened. Their data is encrypted, and they’re thinking of paying the ransom to regain access to their information. Paying the…
Potential Signs for Android Malware

Potential Signs for Android Malware

One easiest way to protect your phone from Android malware is to watch for signs that make you feel like something is wrong. The threat actors can get hold of…
Personal Cyber Security Tip: Apply a Passcode Lock

Personal Cyber Security Tip: Apply a Passcode Lock

Most smartphones available today offer passcode locks and biometric logins. When setting up your passcode, don’t settle for the four-digit pin. Instead, create a strong password with different alphanumeric characters.Remember…
Beware of Fake Shopping Websites

Beware of Fake Shopping Websites

Online shopping is new for some, especially since the beginning of the COVID-19 pandemic, but it is already a favored way to shop for many. It is easy and convenient,…
Mobile Malware is a Real Threat

Mobile Malware is a Real Threat

Smartphones are no longer just a communication tool. Nowadays they hold a lot of data - from your favorite dessert recipes to location, work and financial data.The combined value of…
What is Phishing & How to Protect Yourself from It

What is Phishing & How to Protect Yourself from It

Phishing refers to different types of online scams that ‘phish’ for your personal and financial information (e.g., your passwords, Social Security Number, bank account information, credit card numbers, or other…
Common Mobile-Centric Threats

Common Mobile-Centric Threats

The mobile threat landscape is a fast growing risk. Attackers keep finding new ways to trick users into actions which allow malicious infiltration onto their devices and theft of highly…