Change Your Passwords After a Data Breach Notification

Change Your Passwords After a Data Breach Notification

A data breach occurs when private and confidential information held by an organisation (like banks, retailers, government bodies and other service providers) is stolen or accessed without authorization. This usually…
PayPal Email Scams and How to Spot Them

PayPal Email Scams and How to Spot Them

If you use PayPal for online transactions whether as a seller or a buyer, scammers are ought to get you. There are hundreds of ways scammers can use fake emails…
How to Wipe Your Phone Before Selling

How to Wipe Your Phone Before Selling

If you’re planning to sell, trade in or give away your current phone, there are a number of steps you should take to prepare your phone in order to protect…
Make Sure You’re Protected When Using Bluetooth

Make Sure You’re Protected When Using Bluetooth

A surprising amount of people don’t realize the dangers of Bluetooth. While this handy device-pairing protocol can save you a lot of hassle in transferring files or connecting devices wirelessly,…
Common Text Scams

Common Text Scams

More and more criminals are using text messages to exploit you and to get you to give them information.Here are the most two common types of text scams and how…
How to Avoid Malicious Apps

How to Avoid Malicious Apps

If you think an app is too good to be true, it probably is. This is a Trojan Horse trick: An app may appear to be beneficial - offering free…
Avoid Publicly Sharing Your Location

Avoid Publicly Sharing Your Location

Sharing your location gives strangers, including hackers, the ability to know where you are. Hackers can use information about your location to spear phish you. In other words, they can…
Online Safety Tips for Job Seekers

Online Safety Tips for Job Seekers

Looking for a job is hard work. The last thing you need to deal with is identity theft while you’re searching for employment. Follow these tips to help make your…
Keep Your Phone Software Updated

Keep Your Phone Software Updated

A safe phone is more than just a screen-locked phone. Many hacker exploits rely on vulnerabilities in mobile operating systems – doubly so on Android platforms, which are subject to…
Tips to Protect Yourself from Phishing Emails

Tips to Protect Yourself from Phishing Emails

The best way to protect yourself from malicious emails is to stop them from reaching you. Use a spam filter to catch these messages before they get to your inbox.…