Back to school cybersecurity: hints, tips, and links for a safer school year

Term time is upon us once more, and soon the summer holidays will be a thing of the past. We offer up some handy hints and tips for better back to school cybersecurity, and link to numerous resources of our own to help parents and kids have a safe… Continue reading Back to school cybersecurity: hints, tips, and links for a safer school year

8 everyday technologies that can make you vulnerable to cyberattacks

The security vulnerabilities of the latest developments in tech have been well documented. But what about everyday technologies that have been around for a while or are widely adopted? Here are eight commonly-used tech conveniences that are not as… Continue reading 8 everyday technologies that can make you vulnerable to cyberattacks

The danger of third parties: ads, pipelines, and plugins

We take a look at the perils of the tools and services embedded into the websites you use on a daily basis, thanks to the development help of third parties.
Categories:

101
FYI

Tags: ad networksadsbreachphonespipelinesupply chainthird party

Continue reading The danger of third parties: ads, pipelines, and plugins

A primer: How to stay safe on Amazon’s Prime Day Sale

While Amazon is poised for its fourth year run of Prime Day, the e-commerce giant’s annual flash sales event for Prime members, shoppers on the hunt for bargain deals are ready and revving, too. But before you review your shopping list, let … Continue reading A primer: How to stay safe on Amazon’s Prime Day Sale

When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained

Maybe it’s the quirky way some tech writers abbreviate it, or the surreal way it reminded you of that popular Michael Jackson song. Whatever triggers you to remember the term, for most of us, man-in-the-middle embodies something both familia… Continue reading When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained

Did my comment on your blog get lost?

Automatic filters on our blog sometimes catch benign comments in their nets. However, they also protect users from spammers, scammers, and malicious links. Read on to learn about our comment policy: what we block and why.
Categories:

101
FYI

Ta… Continue reading Did my comment on your blog get lost?

Internet Safety Month: How to protect your child’s privacy online

This month is Internet Safety Month, and today we’ll be talking about online privacy for children. For parents and caretakers, nothing could be more troubling than the thought of having your child’s personal information stolen and used by nefariou… Continue reading Internet Safety Month: How to protect your child’s privacy online

Why tech companies wanted Senate Bill 315 vetoed

Georgia Senate Bill 315 aimed to make all unauthorized access to computers illegal—sounds good, right? Read why provisions in its fine print made tech and security companies more than uncomfortable.
Categories:

101
FYI

Tags: cybersecurity… Continue reading Why tech companies wanted Senate Bill 315 vetoed

HTTPS: why the green padlock is not enough

Cheap hosting deals offering free certificates have made the green padlock a less convincing sign of security. Here’s what to look for to ensure a website is safe to visit.
Categories:

101
FYI

Tags: cacertificatesextended validationgreen padloc… Continue reading HTTPS: why the green padlock is not enough

Engaging students in cybersecurity: a primer for educators

The continuing rise of cybercrime calls for a new breed of fighters. Are teachers prepared to take on the challenge of training the current and future generations of cybersecurity professionals? How can they introduce and engage students in this f… Continue reading Engaging students in cybersecurity: a primer for educators