Looking for a job is hard work. The last thing you need to deal with is identity theft while you’re searching for employment. Follow these tips to help make your…
A safe phone is more than just a screen-locked phone. Many hacker exploits rely on vulnerabilities in mobile operating systems – doubly so on Android platforms, which are subject to…
The best way to protect yourself from malicious emails is to stop them from reaching you. Use a spam filter to catch these messages before they get to your inbox.…
Ransomware is a specific type of malware that demands money from a user and, in exchange, promises to release either the files or the functionality of the device being held…
WhatsApp is one of the world's safest messaging apps – but that doesn't mean it's impervious to hackers.Cyber crooks regularly find ways to break into people's accounts, often using social…
It’s almost always safer to download an app from the official stores, namely Apple Store for iPhones and Google Play Store for Android, rather than from a website. Saying this…
Wi-Fi eavesdropping is a type of man-in-the-middle attack that tricks unsuspecting victims into connecting to a malicious Wi-Fi network. To perform Wi-Fi eavesdropping, a hacker sets up a Wi-Fi hotspot…
Regardless of whether you use an Android or an iPhone, spyware installed on your cellphone can allow a bad guy to take control of your mobile phone’s microphone and listen…
Strong passwords are important for keeping your online accounts and personal information safe from cyber criminals. As the first line of defense against cyber criminals gaining access to your online…
Fake mobile apps are Android or iOS applications that mimic the look and/or functionality of legitimate applications to trick users to install them. Fake apps are created by cybercriminals and…