Information Security
Juice jacking attacks can lead to theft of your personal information and to malware infections. This post looks at what juice jacking is and how to avoid it happening to you. 
By Marc Dahan in Information Security on September 27, 2023
When using a Macbook, iPhone, or iPad, you may prefer a web browser other than the built-in Safari. If so, we’ll help you delete or disable Safari - simply follow this guide.
By Kyle Schurman in Information Security on December 14, 2023
If you have an old Yahoo account floating around that you stopped using a while ago, deleting it permanently may help with your online security. In this guide, we will show you how to do that.
By Kyle Schurman in Information Security on August 10, 2023
If you have concerns that your Google account password is not strong enough to protect you against hackers, we can help you change it and strengthen it. Find out how in this guide.
By Kyle Schurman in Information Security on December 13, 2023
DuckDuckGo makes a search engine, browser extension, and mobile browser that combine to give you high levels of privacy while you use the internet. Find out how DuckDuckGo works in this guide.
By Kyle Schurman in Information Security on September 14, 2023
UK government cyber siege: Each employee faces 2,246 malicious emails annually, highlighting the rel
By Paul Bischoff in Cybercrime Studies on April 18, 2023
Deactivating Snapchat is not difficult, but it does require following precise steps. We will explain how the process of deactivating Snapchat works and exactly what happens to your content.
By Kyle Schurman in Information Security on August 9, 2023
Although deleting your Amazon account is a straightforward process, you do have to follow the required steps precisely, or your account may remain active.
By Kyle Schurman in Information Security on January 24, 2024
Page 12 of 51