Browsers

Overview Browsers such as Google Chrome, Microsoft Edge, Apple Safari, or Mozilla Firefox are one of the most common ways people interact with the Internet. We use them for reading…

0 Comments

Got Backups?

Overview If you use a computer or mobile device long enough, sooner or later something will go wrong. You may accidentally delete the wrong files, have a hardware failure, or…

Comments Off on Got Backups?

Charity & Disaster Scams

Cyber criminals know that one of the best ways to rush people into making a mistake is by creating a heightened sense of urgency. And one of the easiest ways…

Comments Off on Charity & Disaster Scams

Phishing Attacks Are Getting Trickier

Phishing attacks have become the most common method cyber attackers use to target people at work and at home. Phishing attacks have traditionally been emails sent by cyber attackers to…

Comments Off on Phishing Attacks Are Getting Trickier

Securely Gaming Online

What makes online gaming so fun is that you can play and interact with others from anywhere in the world, often you don’t even know the people you are playing…

Comments Off on Securely Gaming Online

The Power of Updating

Overview You may not realize it but cyber attackers are constantly looking for and finding new vulnerabilities and weaknesses in the software people use every day. This software may run…

Comments Off on The Power of Updating

Top Three Social Media Scams

Overview While social media is a fantastic way to communicate, share, and have fun with others, it is also a low-cost way for cyber criminals to trick and take advantage…

Comments Off on Top Three Social Media Scams