Browser Extensions And You

Browser Extensions And You

Browser extensions are useful tools that can add functionality to your internet experience, but they are also being used more frequently as security loopholes, attack vectors for malware, or ways to show users more advertisements. So, what exactly are browser...
Signs Your Computer Could Be Infected

Signs Your Computer Could Be Infected

The rise of phone and email scams has changed the computer threat landscapes, but computers still get traditional malware and adware which can present a security risk as well as being incredibly annoying. Here are some signs that your machine might be infected with...
Building A Phish-Resistant Office

Building A Phish-Resistant Office

Hackers know that the easiest attack vector for compromising networks is the people who interact with them. Phishing is a favorite method of hackers who use social engineering to turn your employees into security exploits. It’s often as simple as sending an emailed...
Social Media And Vulnerability

Social Media And Vulnerability

It sometimes seems like everything we do is documented online. All over the world, people are sharing their likes and dislikes, their dietary choices and their travel plans with friends and total strangers alike. To what extent is the information we are sharing...