Information Security
Is AirDropping safe? Learn how Apple’s file-sharing works, the risks, and how to stay protected with simple settings and privacy tips.
By Richard Ernszt in Information Security on May 19, 2025
Protect yourself from fake job scams. Learn the signs of employment fraud, from vague descriptions to upfront fees. Our guide helps you spot red flags & secure your job search.
By Craig McCart in Information Security on May 18, 2025
Are online survey sites safe? For the most part, not really. Learn how to spot red flags, avoid scams, and stay secure while doing surveys for extra income.
By Richard Ernszt in Information Security on May 16, 2025
Want to keep your passwords, credit card details, and other sensitive personal information private? We cover all you need to know about infostealer malware and how to protect your data.
By Mark Gill in Information Security on May 3, 2025
Received a LinkedIn message that seems just too good to be true? We take you through the tell-tale signs of LinkedIn scams and how you can protect yourself when using LinkedIn.
By Mark Gill in Information Security on May 2, 2025
What is scareware and how does it work? Learn how to identify and remove scareware, or prevent such threats from popping up in the first place.
By Richard Ernszt in Blog on April 18, 2025
Whether you received a Steam gift card offer or are just curious about this online scam, this post will explain how the scam works and what you can do to avoid it.
By Marc Dahan in Information Security on April 2, 2025
Because of Instagram's popularity, scammers are very active on the platform. In this post, we look at the most common Instagram scams and how to avoid them.
By Marc Dahan in Information Security on March 29, 2025
What are third-party apps? Check out some examples, the risks of using unverified apps, and how to manage app permissions to keep your data safe.
By Richard Ernszt in Information Security on March 24, 2025
Page 1 of 52
1252