What is smishing? How to guard yourself against smishing?

Phishing attacks have been taking place ever since the internet became accessible to everyone. But as smartphones and mobile devices became affordable, we needed a new term Smishing is a name given to phishing attacks that take place over mobile devices. What is smishing? Similar to phishing, smishing is when someone manipulates you into giving… Continue reading What is smishing? How to guard yourself against smishing?

Online privacy tips for college students

Online privacy includes a wide range of systems, methods, and ideas aimed at providing more privacy and security to individual users and other parties when using the global Internet. Compulsory privacy declarations on internet sites, data exchange controls, data transparency projects, and other forms of internet privacy exist. Users value privacy and anonymity on the internet.… Continue reading Online privacy tips for college students

Be careful! Types of Venmo scams you should know

With over 50 million US users, Venmo is one of the most widely used mobile payment apps. Bills, rent, and cheques can all be split more easily this way. It’s also a lot quicker than sending money via wire transfer. Scammers, of course, are always lurking around any transaction involving money.  What is Venmo, and… Continue reading Be careful! Types of Venmo scams you should know

What is AI Tech and how does it learn about you

Companies all over the world are using artificial intelligence to learn about their users. Some regions like the European Union do have laws in place to stop this from happening without your consent. There are still a lot of other regions that simply do not care about privacy. But whether you like it or not,… Continue reading What is AI Tech and how does it learn about you

How to ensure security when using a public wi-fi

Picture this. It’s Saturday morning and you’re hanging out at your native cafe using the free Wi-Fi to catch up on some tasks you couldn’t quite get to during your busy week. Sound familiar? This can be a typical situation for several people. However, did you recognize you may be unaware of some threats lurking… Continue reading How to ensure security when using a public wi-fi

What are third-party apps and why they are harmful

We all use apps on our devices. Sometimes, we download them from the official app store of our device manufacturers, such as Google Play or Apple App Store. Other times, we get apps from unofficial or unauthorized app stores. These are known as third-party apps stores. You may have heard of some of these popular… Continue reading What are third-party apps and why they are harmful

Top 5 mobile security threats: how to prevent them?

Over 4 billion people use mobile phone devices for communication, entertainment, and business round the clock. Now,  being productive is not possible without a smartphone. But some of these abundant mobile users create security threats for everyone that can hurt you financially, socially, and personally. Imagine someone steals your banking information from your cellphone and… Continue reading Top 5 mobile security threats: how to prevent them?

9 online safety tips for back-to-school students

Since the onset of the Covid-19 Pandemic, online learning has become Theo order of the day. For most schools and students, online learning became a substitution of learning at school. Nevertheless, remote learning seems to end soon enough as the pandemic comes to an end. Now, parents are busy preparing their children for back to… Continue reading 9 online safety tips for back-to-school students

Hacking vs. Ethical hacking: what’s the difference?

Hacking has a bad image, yet some hackers render the internet a better and safer place. Whether they employ their capabilities for good or evil, hackers possess a wide range of abilities. Indeed, most people held negative attitude toward hacking. But can hacking be beneficial? The answer is suprisingly YES. That is, hacking can be… Continue reading Hacking vs. Ethical hacking: what’s the difference?

Ransomware: what is it and how does it work

Consider the following scenario: you have employee salary information stored on your computer. Right before the monthly payment, you turn on your device and are greeted with a flashing red screen alerting you that your data have been encrypted and that you must pay $ 700 to get them decrypted. It seems that you have… Continue reading Ransomware: what is it and how does it work