How safe is your data with the IoT and smart devices?
By in Information Security, on February 24, 2017 at 4:26 pm
How safe is your data with the IoT and smart devices?

With the rapid growth of the IoT more and more of our data can be accessed through connected devices. How safe is this data from hackers?

SQL injection prevention tips for web programmers
By in Information Security, on February 13, 2017 at 7:13 pm
SQL injection prevention tips for web programmers

SQL injection attacks are becoming more prevalent. Along with the use of dynamic content on websites. This article contains suggestions and code snippets for helping coders prevent these kinds of attacks right in the programs they write.

How businesses can defund fake news by boycotting ad placements
By in Information Security, on February 8, 2017 at 11:02 am
How businesses can defund fake news by boycotting ad placements

Businesses might be advertising on fake news sites without realizing it. Learn how to stop the spread of fake news sites and defund their operations.

Securing your social security number and what to do if it’s stolen
By in Information Security, on February 3, 2017 at 8:13 am
Securing your social security number and what to do if it’s stolen

Don’t let just anyone have your Social Security Number! Here’s how to secure your SSN online, and what to do if you believe it’s been stolen.

How to safely download and install software
By in Information Security, on January 31, 2017 at 4:43 pm
How to safely download and install software

Looking for some popular or niche software? Don’t trust just any website! Our guide should help you safely download and install software from the web.

A complete guide to DRM for beginners
By in Information Security, on January 27, 2017 at 5:05 pm
A complete guide to DRM for beginners

What is DRM? Why is it used? Is DRM good or bad? Real examples of hardware and software DRM. Blockchain DRM. DRM alternatives and arguments.

How to stay safe when paying online, here’s what you should know
By in Information Security, on January 23, 2017 at 9:32 pm
How to stay safe when paying online, here’s what you should know

If you find yourself making a large number of online payments, you may want to consider these helpful tips to stay safe when paying online.

Browser hijacking: What is it and how do you prevent and remove it
By in Information Security, on January 18, 2017 at 3:45 pm
Browser hijacking: What is it and how do you prevent and remove it

Browser hijacking is a type of malware that takes over your browser to make it do things you do not intend. Its effects can run the gamut from mostly harmless ad display up to crippling ransomware infections. This article contains techniques to avoid being infected in the first place, as well as tips to detect and remove hijacks if you do get infected.

Should you ditch WhatsApp for a more private messenger?
By in Information Security, on January 13, 2017 at 6:26 pm
Should you ditch WhatsApp for a more private messenger?

How serious is WhatsApp’s end-to-end encryption “backdoor”? What alternatives are out there? How to turn on security notifications in Whatsapp.

How Airbnb hosts can make their property cyber secure
By in Information Security, on January 11, 2017 at 9:47 am
How Airbnb hosts can make their property cyber secure

How to secure your wifi router and other appliances to protect your and your Airbnb guests from hacking and abuse.