Featured Blogs
How to Protect Your Social Media Accounts
Social media is part of our social fabric. So much so that over 56% of the global population are social...
MoqHao evolution: New variants start automatically right after installation
Authored by Dexter Shin MoqHao is a well-known Android malware family associated with the Roaming Mantis threat actor group first...
Generative AI: Cross the Stream Where it is Shallowest
The explosive growth of Generative AI has sparked many questions and considerations not just within tech circles, but in mainstream...
A Parent’s Guide to ChatGPT
ChatGPT is, without doubt, the biggest tech story of the year. It’s created debate in schools and universities, made history...
Safer Internet Day: Telling What’s Real from What’s Fake Online
On Safer Internet Day, we ask an important question: how can you tell what’s real and what’s fake online? There’s...
How to Beat Robocallers at Their Game
Some scams make a telltale sound—rinnng, rinnng! Yup, the dreaded robocall. But you can beat them at their game. Maybe it’s a call about renewing...
How to Spot Fake Art and Deepfakes
Artificial intelligence (AI) is making its way from high-tech labs and Hollywood plots into the hands of the general population....
This Election Season, Be on the Lookout for AI-generated Fake News
It’s that time of year again: election season! You already know what to expect when you flip on the TV....
Was the Fake Joe Biden Robocall Created with AI?
As voters in the recent New Hampshire primary have found, a fake robocall of President Joe Biden has been making...
Protect What Matters on Data Privacy Day
Imagine a “Privacy Facts” label on the apps, devices, and websites you use. Like a digital version of the “Nutrition...