Internet of Things (IOT) Security: What You Need To Know

Internet of Things (IOT) Security: What You Need To Know

"Internet of things" refers to everyday products or appliances that can connect to the internet through wireless technology. Learn about the security risks and how to protect yourself.

What Is Two Factor Authentication? Do I Need It?

What Is Two Factor Authentication? Do I Need It?

Thwart online thieves with a simple extra step—two factor authentication, and learn how to enable it or turn it off on your iPhone.

Biggest Ransomware Attacks: New Victims in Growing Threat

Biggest Ransomware Attacks: New Victims in Growing Threat

Ransomware attacks have become more frequent as governments, businesses and individuals find their computers hacked, often with threats for payment or lose their data. Learn how to protect yourself.

Hackers RSVPed ‘Yes’ to Breaching 100M+ Evite Accounts

Hackers RSVPed ‘Yes’ to Breaching 100M+ Evite Accounts

Online invitation platform Evite recently announced a breach that exposed data associated with nearly 101 million user accounts.

11.9 Million Patient Medical Records May Have Been Exposed in Latest Data Breach

11.9 Million Patient Medical Records May Have Been Exposed in Latest Data Breach

A third-party collections agency that works with Quest Diagnostics was breached, potentially exposing nearly 12 million patient records.

WhatsApp Security Breach: Here’s How to Protect Yourself

WhatsApp Security Breach: Here’s How to Protect Yourself

If you’re among the many people who delay updating the apps on your smartphone, ignoring the latest one from the free messaging service app WhatsApp may expose your phone and your personal information to hackers.

Cybersecurity 101: Steps You Can Take To Better Protect Your Data

Cybersecurity 101: Steps You Can Take To Better Protect Your Data

As data breaches become more common, it's important to know how to better protect your personal data from hackers. Here are some basic cybersecurity steps you can take.

Were You Impacted By the Collection #1 Data Breach?

Were You Impacted By the Collection #1 Data Breach?

Were your email addresses and passwords exposed in the massive Collection #1 data aggregation? Here's how you can find out.

Santa Letter Scam: Key Warning Signs

Santa Letter Scam: Key Warning Signs

For many children, writing their annual letter to Santa Claus is almost as exciting as finding gifts under the tree on Christmas morning. Imagine how excited they’d be if Jolly Old St.

What The Equifax Hack Means To You

What The Equifax Hack Means To You

Last week, the credit reporting agency Equifax revealed that nearly 143 million Americans were affected by a massive security breach that put personal information, such as Social Security numbers, birth dates, addresses and driver’s licenses, into the hands of hackers.

5 Ways the Past Will Catch Up With You

5 Ways the Past Will Catch Up With You

There’s something creeping up behind you. It’s none other than the past: that thing you’re always leaving behind. Or did you? From your online footprint to your real-life reputation, what you do today often has either positive or negative consequences in the future.

8 Simple Steps for Personal Cybersecurity in 2017

8 Simple Steps for Personal Cybersecurity in 2017

The issue of cybersecurity has become personal. In 2017, we must protect ourselves and our families from hackers, cybercriminals, predators and scammers. Just consider it good hygiene of the Digital Age.

2016: The Year of Hacks

2016: The Year of Hacks

From the Yahoo email hacks to the digital spying upon the DNC, 2016 was a frightening year of hacking. This is alarming since, year-by-year, our lives are becoming more and more integrated into the cyberworld.