What Do These Popular Video Messaging Services Know About You?
What information does Skype, Zoom, Google Hangouts, Microsoft Teams, and WebEx store about you?
533 Million Facebook Records Were Just Leaked Online for Free
The actual leak first took place last year, but someone just put all the records up online at no cost.
What Does Indicators of Compromise Mean? The Best Tools to Help Monitor Them
Indicators of Compromise provide clues and evidence regarding data breaches. Learn the importance of monitoring them and four tools that can help.
Using Your Own Device For Work? Here's How to Secure Business and Private Data
This is how you can create strong Bring Your Own Device (BYOD) policies at work, to keep information secure.
How To Protect Your Telegram Messages With a Passcode
Here's how you can add a passcode to protect and safeguard your Telegram messages from prying eyes and unauthorized access.
Does My Game Console Have a Virus?
If your console if behaving oddly you might suspect it has a virus. But can game consoles get viruses - and how would you know?
Is Microsoft 365 Actually a Security Risk?
If you use Microsoft 365, you might be wondering how it secures your data in the cloud. So is it a threat to your security?
KeePass vs. LastPass vs. 1Password: Which Password Manager Should You Choose?
Check out this password manager comparison to find out which is the best app to store your login credentials.
What Is Malware and How Does It Work?
Malware is running rampant. Learn how it works and how you can prevent being infected.
What Is Purple Fox Malware and How Can It Spread To Windows?
Learn everything about the re-purposed Purple Fox malware and how to protect yourself from this growing threat.
What Are Brute-Force Attacks? How to Protect Yourself
What is a brute-force attack? Here's how this common attack works and how to keep yourself safe from it.
Can You Really Go Passwordless to Secure Your Online Accounts?
Many services point out the benefits of passwordless logins, but are they really more secure? Are they even realistic?
What Is Spyware and How Does It Work?
Spyware records your online activities without permission. Learn how it works and how you can stay safe.
How Secure Is a Password Manager, and Are They Safe?
Password managers like LastPass are convenient and mostly free to use. But are they safe? How do they keep you secure?
Privacy vs. Anonymity vs. Security: Why They Don't All Mean the Same Thing
What's the difference between security, anonymity, and privacy? And when should you prioritize one over another?
Why That Email About Your Apple ID Being Locked Is a Scam
Here are the most common signs that you're dealing with a phishing email that will steal your Apple ID and password.
Learn How Hackers Can Hack Your Facebook Account and How to Fix It
Here's how cybercriminals hack into a Facebook account, and how to protect yourself from attackers.
The 20 Top Passwords You Should Never Use: Is Yours on the List?
If one of your passwords is on this list of easy-to-guess combinations, you need to change it right now!
We Followed Clickbait Internet Ads: Here's What We Found
We wanted to find out more about scammy clickbaity online ads by doing what no one means to do: clicking on them.
You Can Now Use Multiple Physical Keys to Log In to Twitter
Physical keys are more secure than SMS codes or authenticator apps when it comes to protecting your Twitter account.