Like most everyone else, you probably receive spam and phishing emails all the time.If a spam email makes it through to your device, do not click “unsubscribe” in the message…
QR codes have a variety of uses, from storing bank information for payments to ordering at restaurants or joining a WiFi network. But the easy-to-use codes don’t come without security…
Web-based threats are subtle and tend to go unnoticed. They happen when people visit affected sites that seem fine on the front-end but, in reality, automatically download malicious content onto…
A data breach occurs when private and confidential information held by an organisation (like banks, retailers, government bodies and other service providers) is stolen or accessed without authorization. This usually…
If you use PayPal for online transactions whether as a seller or a buyer, scammers are ought to get you. There are hundreds of ways scammers can use fake emails…
If you’re planning to sell, trade in or give away your current phone, there are a number of steps you should take to prepare your phone in order to protect…
A surprising amount of people don’t realize the dangers of Bluetooth. While this handy device-pairing protocol can save you a lot of hassle in transferring files or connecting devices wirelessly,…
More and more criminals are using text messages to exploit you and to get you to give them information.Here are the most two common types of text scams and how…
Sharing your location gives strangers, including hackers, the ability to know where you are. Hackers can use information about your location to spear phish you. In other words, they can…