Are You Being Watched Through Your Webcam?

Hacked webcam_404_header2
A few clicks of the mouse, and your webcam is activated and ready to be used. But have you considered the possibility that someone else could be watching you through your own webcam? The thought of this probably sends chills down your spine, and it should, as this is very real- and extremely creepy.
Continue Reading Are You Being Watched Through Your Webcam?

Protecting Kids Online

Keeping Kids Safe Online_header
With kids accessing the Internet to check their email, to browse the Web and play online games, or just to stay connected with friends and family through chat or social networking services, the risk of being exposed to many online dangers becomes very real. Here in our infographic, we address some of the online dangers kids could face, ways they can be exposed, and a few steps parents can take to keep their kids safe.
Continue Reading… Protecting Kids Online

What to Do When Your Device is Stolen

STOLEN DEVICE_HEADER
Your iPhone or iPad probably has your entire life on it—from photos, apps, contacts, and communications. What would you do if it is ever stolen?

There are some preemptive measures you can take to make the loss less traumatic in the event your device does get stolen.
Continue Reading… What to Do When Your Device is Stolen

What Apps Have Access to Your Facebook and Twitter?

Facebook and Twitter apps access_header

While social media sites such as Facebook and Twitter make it easy to share things with your friends, they also make it easy to log in to various services and applications, too. As authentication brokers, Facebook and Twitter let users use their account credentials to sign into third-party sites. To do so, the user has to give permission for those sites to access their profile data.

Facebook is a full-blown apps ecosystem. You may have added an app to take advantage of a promotion or contest, played a game, or added new functionality such as music streaming. In most cases, it just means the app developer has access to some of your profile data. In the worst-case scenario, a malicious developer behind the service can use your account to send out spam.
Continue Reading… What Apps Have Access to Your Facebook and Twitter?

How to Turn on Two-factor Authentication for Your Email Accounts

Two-Factor Authentication
Our email accounts contain a ton of information about ourselves. We sign up for bank accounts, buy things online, and communicate with others using our email addresses. And the only thing keeping the attackers out is the strength of our passwords.

No matter how complex the passwords are, they are not foolproof. The attackers have cracking tools at their disposal and other tricks to get access to our accounts. Two-factor authentication prevents attackers from getting in even when they’ve gotten our passwords.
Continue Reading… How to Turn on Two-factor Authentication for Your Email Accounts