Skip to content

Online Safety

How to Set Up a VPN on PlayStation

If you’ve ever wanted to access location-blocked content with your PS5, you’ve probably noticed that you can’t use VPN apps on your PlayStation. While Sony discourages users from using VPNs by not making them available in the PlayStation store, there are still ways to use a VPN with your PlayStation console. This guide covers two…

[Read More]

We’re in a Cyber Pandemic — Here’s What You Can Do About It

The COVID-19 pandemic has touched nearly every aspect of our lives and caused ripple effects that will continue for years to come. Many consider the economic damage as one of these knock-on effects, but it may not be the biggest threat to come out of the pandemic. What could concern us the most in the…

[Read More]

Zero-Day Attacks: What They Are and How They Affect You

One piece of advice you always hear from cybersecurity experts is to keep your software, applications, and systems up-to-date. Why is this so important? Because if you don’t, you’re a prime target for a zero-day attack. What is a zero-day attack? A zero-day attack, vulnerability, or exploit is one that developers or vendors have only…

[Read More]

Credential Stuffing: Why It Matters and What You Can Do to Avoid It

Every day, hackers come up with new ways to steal information and wreak havoc on individuals, organizations, and businesses. It seems like we learn about new types of cyberattacks all the time, requiring us to keep a constant and vigilant eye on all our online accounts. That’s exhausting.  One type of cyber attack that has…

[Read More]

The Dangers of Face Swapping Apps + How to Stay Safe

In recent years, AI face-swapping apps, also known as “deep fake” apps have become hugely popular. Users can swap out their face with a celebrity, put their face in a premade video, or swap faces with friends. While these apps were created for harmless fun, they’ve raised many concerns about data privacy, spreading disinformation, and…

[Read More]

How to Protect Your Company Against Supply Chain Attacks

With the tidal wave of supply chain attacks in the last few years (think SolarWinds and NotPetya), companies need to be more wary than ever about who they trust to make their software. The stakes are high. If you’re like most organizations, you can’t produce all of your software in-house. That means you’ll have to…

[Read More]

How to Scan Your PC for Malware for Free

Are you suspicious that your computer is infected with malware? Microsoft has a built-in program that runs a malware scan on your PC for free. It’s incredibly simple, and it keeps your computer safe. In the past, Windows Security had a reputation for being useless, but now it’s on par with Avast and Kaspersky. In…

[Read More]

What Are the Risks of Biometrics and Can They Be Hacked?

We’ve all had some pretty crazy images burned in our brains watching science-fiction biometrics in movies over the years.  Iris recognition was a big thing in Blade Runner because it distinguished the replicants from the humans. In The 6th Day, Arnold Schwarzenegger’s clone enters an elevator using a stolen thumb for fingerprint recognition.    And there…

[Read More]