Cyberthreats can take the fun out of connected gadgets – here's how to make sure your children enjoy the tech without putting themselves or their family at risk
Are mobile payments and digital wallets safe? Are the apps safer than credit cards? What are the main risks? Here’s what to know.
Here’s what to know about attacks where a fraudster has your number, literally and otherwise
From keeping your account safe to curating who can view your liked content, we look at how you can increase your security and privacy on TikTok
It's never too soon to plan for what will happen to your digital presence after you pass away
ESET Chief Security Evangelist Tony Anscombe sat down with us to share his insights on how to avoid falling prey to online fraud
What are some of the common signs that your children may be screen addicts and what can you do to limit their screen time?
Have you had a Google Privacy Checkup lately? If not, when better than Data Privacy Day to audit the privacy of your Google account?
As software becomes more important than ever, how can engaging the security industry make the road ahead less winding?
Disposing of old tech isn’t a one-click solution; there are multiple things you have to consider before moving on to greener pastures
What are some of the key things you should do with your shiny new device as soon as you unbox it?
What are some of the most common warning signs that your child is experiencing online harassment?
Following the revelation that a list containing millions of stolen usernames and passwords had appeared online, we tell you a few different ways to find out if your credentials were stolen in that—or any other—security breach
As the threat of bogus apps continues, what can we do to protect ourselves against these fraudulent practices?
Should schools and businesses do more to combat the shortfall of cybersecurity professionals by changing the hiring process for those interested in having a career in the industry?
Top tips to help you avoid being caught receiving or sending phishing-looking emails
The big challenge with IoT devices is that they are all different: Each manufacturer has its own firmware, uses different protocols, and designs its own architecture. So, the first step before carrying out any analysis is to understand the architecture, find out what components are involved, and how they interact and communicate among themselves.
While it certainly doesn’t hurt to ask for help from local law enforcement, know that even major cities may not have the expertise or the bandwidth to investigate compromised mobile devices. The most important objective is to take steps to make sure you’re safe. Ask for help, but do not wait for others to help you.
The holidays are a time when people purchase gifts for their friends, families, and yes, even for themselves. Increasingly, children are using and accessing more and more digital devices — making it important for everyone to work together to secure these devices.
The router is the first device that you must consider, since it not only controls the perimeter of your network, but all your traffic and information pass through it.