Information Security
Internet use among seniors is on the rise, and so are cybersecurity threats. We explore some of the risks facing older adults online, as well as essential safety tips to stay safe. 
By Mark Gill in Information Security on August 21, 2025
Sick of remembering dozens of passwords? Passkeys offer a safer, faster way to log in. Are passkeys safe? Find out in our guide to passkeys and how to use them.
By Ray Walsh in Information Security on August 4, 2025
What is bossware? As remote work becomes more common, employees are finding that their activities are being tracked. Is your boss tracking you? We explain how to check.
By Ray Walsh in Information Security on August 3, 2025
What is webcam hacking? Worried that hackers are using spyware to access your webcam or smartphone camera? We explain the dangers of webcam hacking and how to avoid it.
By Ray Walsh in Information Security on July 28, 2025
Discover the basics of wardriving in cybersecurity, including the tools wardrivers use, how they use gathered data, and how to protect yourself against attacks.
By Richard Ernszt in Information Security on July 24, 2025
What is a logic bomb attack? Discover the basics behind these stealthy cyberattacks and the potential harm they can cause to users and organizations.
By Richard Ernszt in Information Security on July 22, 2025
Is Plaid safe to use? Learn how it works, what data it collects, and what privacy and security measures are in place, along with some popular alternatives.
By Richard Ernszt in Information Security on July 21, 2025
This guide explains how E-ZPass toll scams work, what signs to watch for, and how to avoid falling for fake unpaid toll messages sent by scammers. 
By Richard Ernszt in Information Security on July 13, 2025
This article breaks down why spam calls are more than just annoying interruptions. We also show you how to dodge scams and stay a step ahead.
By Diana Bucur in Information Security on June 30, 2025
Page 1 of 53
1253