Articles by Author

Internet Security
‘Sleigh’ Holiday Shopping by Protecting Your Online Security
The onset of the global health emergency caused users everywhere to live, work, play, and buy through their devices. However,...Nov 16, 2020 | 4 MIN READ

Privacy & Identity Protection
How To Keep Your Data Private Online
Whether data gets collected for advertising purposes, or to generate profit by selling data to others, your...Nov 15, 2020 | 8 MIN READ

How To Guides and Tutorials
How to Prevent Keyboard Snooping Attacks on Video Calls
Video calling has rapidly become the mainstream method for remote communication, allowing users to stay connected. But very few may...Nov 13, 2020 | 3 MIN READ

Internet Security
Thankful for broadband internet, and hopeful for much more
We’ve shopped, worked, studied and taught, job hunted, and cared for each other online this year in ways we haven’t before. So much that it’s difficult to imagine...Nov 12, 2020 | 6 MIN READ

Family Safety
Understanding the Risks of Using an Android Device
Android has, over time, become a popular target for hackers. Recently, McAfee Labs™ found that all new...Nov 12, 2020 | 6 MIN READ

Family Safety
Understanding Online Trolls and How to Deal with Them
Imagine, if you will, a person goes online each day with the sole mission to trigger confrontation...Nov 11, 2020 | 8 MIN READ

Family Safety
Pickpocketing – Digital Style
Gone are the days when thieves would physically steal your wallet. Instead, they are using sophisticated techniques...Nov 08, 2020 | 7 MIN READ

Family Safety
Are You Forwarding Jokes Or Spam?
With the advent of messaging and social media applications, sharing jokes or memes has become increasingly frequent...Nov 08, 2020 | 7 MIN READ

Family Safety
5 Ways to Safeguard Your Child’s Instagram Bio
Keeping your child safe online is a growing concern for many parents. However, there are ways you...Nov 08, 2020 | 6 MIN READ

Privacy & Identity Protection
How To Tell If Your Smart TV Spying on You
In a chilling echo of George Orwell’s dystopian novel 1984, it’s possible that Big Brother – or...Nov 07, 2020 | 6 MIN READ

How To Guides and Tutorials
Two-Factor vs. Multi-Factor Authentication: What’s the Difference?
This article breaks down the forms of authentication, explaining how they work and how they can enhance...Nov 06, 2020 | 6 MIN READ

Privacy & Identity Protection
Beware of Malicious Mobile Apps
With the surge in the usage of mobile phones, there has been a concurrent increase in malicious...Nov 06, 2020 | 6 MIN READ