How to Secure your Smart Home Devices

Secure Smart Home DevicesSmart home devices put you at all kinds of risk. Your house can spy on you, your devices can listen to you and they can even identify when you aren’t at home. The connectivity and convenience these devices are built with have advantages and disadvantages. You don’t have to stay at risk; you can boost your security and stay safe from hackers instead!

Read more…

Is your Webcam Spying on you?

Webcam securityHow many devices do you have with cameras around the house? You probably have some laptops, a few cell phones, perhaps a baby monitor, and maybe even a home surveillance system. Even though cameras are meant to enhance our devices capabilities, in reality they are putting us in danger.  Cybercriminals are able to hack into these cameras to steal our personal information and spy on us.

 

Read more…

5 Cyber Security Threats to be Aware of in 2017

This year is coming to a close and we should prepare to protect ourselves from the innovative and imminent cyber threats of 2017. Being aware will keep you ahead of the game and ensure you’re secure and protected against all the latest threats. Learn more about some of the biggest cyber threats to look out for in the upcoming year.

Read more…

Yahoo Users – Beware of Phishing Attempts

yahoo user breachThere has been a lot of trouble for Yahoo users lately since they announced there was a breach of 1 billion Yahoo accounts in August 2013, and then in September released a statement that in 2014 an additional 500 million Yahoo  accounts were breached. Yahoo has been urging their users to change their passwords and update their security.

Read more…

What You Need to Know About the ImageGate Ransomware

ImageGate RansomwareRansomware is a form of malware that encrypts a user’s data and prevents them from accessing their personal files until they pay the hacker for their files back. Sometimes users are requested to pay hundreds of dollars in order to receive a decryption key. Usually, ransomware is transmitted through infected email links, malicious websites or popup messages.

Read more…