Internet Safety Month: How to manage your child’s online presence

Parents with good intentions may not realize that by sharing photos of their children on social media, they have already created their online presence. The good news is that their online reputation can be managed, and you can teach them how t… Continue reading Internet Safety Month: How to manage your child’s online presence

Did my comment on your blog get lost?

Automatic filters on our blog sometimes catch benign comments in their nets. However, they also protect users from spammers, scammers, and malicious links. Read on to learn about our comment policy: what we block and why.
Categories:

101
FYI

Ta… Continue reading Did my comment on your blog get lost?

Five easy ways to recognize and dispose of malicious emails

What should you check for to determine if an email is spam or malicious? Here are five red flags to look for—and what to do with those malicious emails when you find them.
Categories:

101
How-tos

Tags: emailmalspamphishingred flagssafe pr… Continue reading Five easy ways to recognize and dispose of malicious emails

Internet Safety Month: How to protect your child’s privacy online

This month is Internet Safety Month, and today we’ll be talking about online privacy for children. For parents and caretakers, nothing could be more troubling than the thought of having your child’s personal information stolen and used by nefariou… Continue reading Internet Safety Month: How to protect your child’s privacy online

Why tech companies wanted Senate Bill 315 vetoed

Georgia Senate Bill 315 aimed to make all unauthorized access to computers illegal—sounds good, right? Read why provisions in its fine print made tech and security companies more than uncomfortable.
Categories:

101
FYI

Tags: cybersecurity… Continue reading Why tech companies wanted Senate Bill 315 vetoed

Where did the tech support scam blacklist go?

We’ve removed our blacklist of recognized tech support scammers from our tech scam support page. Here’s what we’re doing instead.
Categories:

101
How-tos

Tags: how toscambaitingtech support scamTSS

(Read more…)

The post Where did the… Continue reading Where did the tech support scam blacklist go?

HTTPS: why the green padlock is not enough

Cheap hosting deals offering free certificates have made the green padlock a less convincing sign of security. Here’s what to look for to ensure a website is safe to visit.
Categories:

101
FYI

Tags: cacertificatesextended validationgreen padloc… Continue reading HTTPS: why the green padlock is not enough

Engaging students in cybersecurity: a primer for educators

The continuing rise of cybercrime calls for a new breed of fighters. Are teachers prepared to take on the challenge of training the current and future generations of cybersecurity professionals? How can they introduce and engage students in this f… Continue reading Engaging students in cybersecurity: a primer for educators

The Internet of Everything and digital privacy: what you need to know

Statistics indicate within the next couple of years, there will be three IoT devices for every adult and child on the planet—IoT will truly be the Internet of Everything. So, should people be concerned about privacy and data security if thes… Continue reading The Internet of Everything and digital privacy: what you need to know

Securing financial data of the future: behavioral biometrics explained

Sophisticated social engineering. Fileless malware. Specialized Trojans. These are the threats that keep the financial sector on its toes—making way for a new mode of authentication called behavioral biometrics. And its primary concern… Continue reading Securing financial data of the future: behavioral biometrics explained