The 5 stages of phone loss grief
Its happened to most of us. That urge to look at your phone has become a part of everyday life. Maybe you are expecting a phone call, or perhaps you want to know how many likes that picture of your...
Its happened to most of us. That urge to look at your phone has become a part of everyday life. Maybe you are expecting a phone call, or perhaps you want to know how many likes that picture of your...
Explore topics
7 days of FREE* comprehensive antivirus, device security, and online privacy.
Join today. Cancel anytime.
*Terms Apply
Although WiFi has greatly increased convenience for laptop and smartphone users, it’s also opened up a significant number of security risks. Here’s how you can protect yourself from these threats.
Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging...
Mobile ransomware is a form of malware that steals sensitive data or locks a device permanently and then demands payment before unlocking it or returning the data to the user. Folks are tricked into accidentally downloading it through social networking schemes, assuming that they are downloading innocent content or critical services.
How does a VPN for your smartphone protect your privacy? Learn how using a VPN on your smartphone, especially while using public Wi-Fi networks, can help keep your browsing activity safe and private.
The Internet of Things or IoT: It’s a phrase you may have seen or heard as our world grows more connected by the day. But what does it mean?
A honeypot is a computer or computer system intended to mimic likely targets of cyberattacks. Learn more about what a honeypot is and how it works.
The connected home is focused on ease of use and convenience. Have you ever left the house and wondered if you turned the heater off, or locked the front door? Well, with the connected home, there’s an app for that!
Wearable devices, the connected home, and the connected car are all relatively recent technologies, yet have quickly become the new rage in tech. Everything from the devices in your pocket to the appliances in your home and the car you drive can transmit information about your life habits because they all have one thing in common...
Grayware can affect your device’s performance and compromise your security online, as well as being a nuisance.
Cyber security is the state or process of protecting networks, devices, and programs from any type of cyber attack. Cyber security starts with users having good cyber threat defense education.
Borrowed from the story of the wooden horse used to trick the defenders of Troy into sneaking soldiers into their city, a Trojan Horse hides malware in what appears to be a normal file.
Antivirus software searches for known threats and monitors the behavior of all programs. It seeks to block or remove malware as quickly as possible. If you don’t have antivirus software installed, you could be at risk of picking up a virus.
Your new Mac computer or iOS update means it’s a good time to think about security and privacy. Here’s how.
Here are seven risky online habits to put away today, along with tips on better ones that can help you stay safer when you connect.
Vacations can be an exciting, happy time for people to get away and avoid the everyday worries of home. But fun can come to a halt if your personal data is compromised while traveling.
You might be tempted to sign up for a free VPN service. But are free VPNs safe to use? Learn more.
Want more?
Follow us for all the latest news, tips and updates.