Skip to content

Online Safety

A Password Manager Plus Two-Factor Authentication: The One-Two Punch That Knocks Hackers Out!

As a super strong extra layer of security, two-factor authentication prevents a thief who knows your login credentials from signing in.

[Read More]
Frustrated Hacker

Using A Password Manager Drives Hackers Crazy!

“The single best thing someone can do to better protect their accounts is to choose and use a password manager,” explains Chris Parker, CEO of “With that simple decision, you significantly improve your account security.”

[Read More]
Password Strength Meme

Password Tips: The ABCs of Protecting Your Bank Account.

Even though your account passwords seems like the basic place to start, cybersecurity experts say starting there takes care of most of your account security and worries.

[Read More]
Shocked-looking girl on her smart phone.

Instagram May Not Be Safe for Your Kids

Parents may want to get familiar popular apps because platforms like Instagram may not be safe for youngsters, especially if their kids are using it—which they probably are. It is one of the most popular apps for kids and teens, even it’s not the best place for them to be. As it turns out, Instagram…

[Read More]
Teen boy on his laptop.

Teen Boys Are Being Blackmailed by Scammers.

Scammers have a scheme for every age group, because every age group today congregate somewhere online, looking for connections, information and more. For teenage males, that “more” is often connections with new female friends online. And that’s what scammers are exploiting these days. According to a story in the Wall Street Journal in November of…

[Read More]
CSRF attacks typically don't directly involve stealing passwords, they can indirectly impact user security and authentication if they lead to unauthorized actions being taken on a user's behalf.

What is CSRF? Understanding Cross-site Request Forgery

CSRF attacks are an old and well-established method of attacking individual users on website domains by forging iframe requests.  Fortunately, most sites have protections in place to prevent this kind of attack. Even so, it’s a great idea to understand the basic methods of how attackers use CSRF requests, because this knowledge can make you…

[Read More]
Backdoor attacks are initiated with the aim of gaining unauthorized access to a system or network.

What Is a Backdoor Attack? Types of Backdoors and How to Detect Them

A backdoor is a hidden vulnerability or a method of bypassing a website’s normal authentication procedures that allow access to that system. A backdoor attack is a type of cyber attack in which a hacker gains unauthorized access to that system.  Although they are technically a virus and a kind of Trojan attack, backdoors aren’t…

[Read More]
DNS tunneling is a technique that misuses the DNS protocol to bypass network security measures and transfer data covertly.

DNS Tunneling: An Invisible Threat That Calls for Vigilance

The internet’s Domain Name System (DNS) serves as our trusty translator, turning website names into IP addresses that computers can understand.  Unfortunately, DNS’s universal use has also made it an ideal vehicle for cyberattacks to slyly sneak in.  DNS tunneling has emerged as one of the most troubling threats, providing attackers with covert communication channels…

[Read More]