Unused Apps Can Impact Smartphone Storage, Performance and Security
I’m old enough to remember those Black Flag commercials from the early '80s with the slogan “Roaches check in, but they don’t check out.” Today, the smartphone variation of that ...
Quick-Guide to Secure Passwords
The FBI along with other security experts are now recommending a “pass phrase” rather than simply a password. Such a phrase should be relatively long – at least 15 characters ...
Read More
Read More
Risk of Ransomware to National Infrastructure
The shutdown of Colonial Pipeline, which delivers gasoline, diesel, and aviation fuel to much of the East Coast, is a reminder that essential institutions and the people they serve are ...
Read More
Read More
Tips for Preventing ‘Ransomware’ Attacks
A ransomware attack can encrypt data or lock you completely out of your device. It can also be used as a form of blackmail or extortion if the hacker finds ...
Read More
Read More
Protect Against Identify Theft
There are things you can do to reduce the chances of being a victim of identity theft, and if you are a victim, there are things you can do to ...
Read More
Read More
Do Passwords Really Protect Us?
Online security expert Andrew Shikiar of FIDO Alliance talked to us about phishing, vishing, social engineering, and what's wrong with passwords. "Simply put, passwords aren't up to the task." ...
Read More
Read More
Australia eSafety Commissioner Julie Inman Grant
We spoke with US-born Julie Inman Grant about her role as Australia’s eSafety Commissioner, the country's national independent regulator for online safety. Julie talked about her unique government role and ...
Read More
Read More
Cybersecurity During COVID-19 (Webcast)
Larry Magid and Kerry Gallagher spoke with McAfee's Baker Nanduru, who had some excellent advice for all of us who are at a higher security risk due to all the ...
Read More
Read More
Gmail Anti-Phishing Technology Looks Promising
Phishing is one of the internet’s biggest security risks. That’s when a scammer sends you an email that appears to come from a legitimate source, like your bank or a ...
Read More
Read More
Advice on Sexting, Sextortion and Revenge Porn
The safest way to avoid a picture getting into the wrong hands is to never take it, allow it to be taken, or share it. Sadly, there are cases (sometimes ...
Read More
Read More