Skip to content

Online Safety

7 Apps That Will Make You Feel Safer

Many Americans are afraid for their personal safety these days. Chapman University conducts a survey on fears in the U.S. each year and as of 2018, 23 percent of respondents were afraid of walking alone at night. Twenty-eight percent were afraid of mugging, and 25 percent of abduction or kidnapping. If you’re one of the…

[Read More]

When Not to Click: Diagnosing Tricky Links

There are tons of ways for hackers and cybercriminals to do damage. But sadly, this often happens by simple mistakes people make to give hackers access. While, yes, they can find their way onto your network or device… they’re most often let in. One of the easiest ways for cybercriminals to get onto your network…

[Read More]

Browsing Incognito 101: How To Browse In Secret

The browsing history on your computer holds a ton of information. Your search history shows all the things you don’t know that you quickly Google. It can reveal the things that worry you about your health, the law, or politics. Your browsing history can expose the things you look up at 3 am when you…

[Read More]

Why You Should Use a Burner Phone with Online Dating & Other Cyber Safety Dating Tips

Online dating can be a bit of a drag. There’s the waiting for replies, answering the same questions over and over, and screening out duds. But it can evolve into a real nightmare if you don’t take proper precautions. While many people dating online are just looking for love, there are plenty of safety concerns.…

[Read More]

Why Do You Need a Secret Phone Number? And How to Get One

We are super reliant on our phones. We don’t just need them for catching up with friends or business calls. Some people run their entire lives from their phones. Mobile devices have become as important to our lives as computers. And yet, we don’t realize all the ways someone having our phone number can put…

[Read More]

The Best Two-Factor Authentication Apps for iOS and Android

You’ve heard it before: strong passwords help secure your accounts. But even a strong password might not be enough. If there’s a data breach and your info gets published online, it won’t matter if your password is “password123” or “q35Hiu%iL18.” Hackers will still be able to use it to get into your account. To make…

[Read More]

How the Biggest Hacks of the 2010s Compromised User Security

The 2010s was one of the worst decades from a cybersecurity standpoint. Some breaches were geopolitical, going after nation-states. But many affected individuals and their data. Here’s a list of some of the biggest hacks of the 2010s that compromised user security and changed the way we think about cybersecurity. The Democratic National Committee The…

[Read More]

How to Make a Temporary Email Address and When to Use It

Most of us have signed up for a website’s product or service, only to receive a deluge of spam emails afterward. This is annoying, and while there are several ways to declutter your inbox, one of the most effective strategies is creating a temporary email address. Temporary, or disposable email addresses take no time to…

[Read More]