Featured Blogs
Webcam Blackmail: How Cybercriminals Breathe Life into Laptops
Stories of inanimate objects coming to life are familiar to us. Movies such as Toy Story show the idea’s cultural...
Pokémon Go: How Families Can Stay Safe (and Still Catch ‘Em All)
Thanks to the new augmented reality game Pokémon Go, app fans across the globe are enjoying countless hours of fun...
Keeping Your Mobile Device (and Your Personal Life) Safe with IoT
Life is made up of the little things. There are ‘fuzzy feeling’ little things; like when the nice lady in...
My Favourite Mothering Apps
I honestly don’t know where I would be without my favourite collection of apps. With four kids, too many pets,...
Patch Now: Simple Office ‘Protected View’ Bypass Could Have Big Impact
Protected View is a security feature of Microsoft Office. According to research from MWR Labs, Protected View mode is a strong...
The Facebook Cull and Why You Should Embrace It!
So, how many friends do you have on Facebook? Do you really know them or were they just a passing...
What Could (Pokémon) Go Wrong?
This blog was written by Bruce Snell. If you’re like me, your Facebook feed (and Twitter, Instagram, Vine, etc) has...
Trojanized Pokémon GO Android App Found in the Wild
Pokémon GO is a new mobile game that allows fans to “catch” Pokemons in the real world using augmented reality...
Update Your Toaster: How IoT Devices Can Be Conscripted into Botnets
Charles Strite, according to Lemelson-MIT, first introduced the modern toaster in 1926. It was, and remains to this day, a...
Business Email Compromise Hurts Your Organization
As many workers do today, you probably get emails from your boss asking you to perform various tasks. You may...