Security & Privacy

February 20, 2020

Should You Use Your Face to Unlock Your Phone?

Many smartphones include facial recognition systems that allow users to unlock their devices with just their faces, but is using them a good idea? Here is […]
February 17, 2020

5 Email Scams to Watch Out for During Tax Season

It is tax season in the United States, which means both businesses and individuals are at risk of being conned out of their money or data. […]
January 27, 2020

Have a WordPress Site? Watch Out for WP-VCD

In the latter half of 2019, malware known as WP-VCD was installed on more new WordPress sites than any other malware — and this trend is […]
January 23, 2020

Update Your iPhone or iPad to Patch the AirDoS Bug

If your iPhone or iPad is not running the latest system software, you could fall victim to an attack that could make your device temporarily unusable. […]
January 20, 2020

Hackers’ Newest Trick Hides Ransomware While It Encrypts Victims’ Files

A ransomware variant known as Snatch is now more dangerous than ever. Learn about the newest trick that cybercriminals are using to make this ransomware harder […]
January 6, 2020

Flaws in Qualcomm Chipsets Are Leaving Android Devices Vulnerable

The Qualcomm chipsets in many Android smartphones have vulnerabilities that could let cybercriminals gain access to passwords and other highly sensitive data stored in the devices. […]
December 30, 2019

How to Use Your Laptop’s Bluetooth Connection Securely

Using Bluetooth to connect devices to your laptop is convenient but also risky. Discover what those risks are and how to minimize them. Many laptops come […]
December 23, 2019

6 Things to Consider When Choosing an Anti-Spyware App

Cybercriminals use spyware to record keystrokes, copy files, read emails and much more. One of the best ways to keep spyware off your devices is to […]
December 12, 2019

Two New, Unconventional Ransomware Programs Might Be Coming Your Way

Two new ransomware variants — AnteFrigus and PureLocker — made the rounds in November 2019. Learn why these programs caught the attention of security experts. Although […]