How to spot if your child is a victim of cyberbullying

What are some of the most common warning signs that your child is experiencing online harassment? Cyberbullying is by no means a new phenomenon; in fact, the term was added to the Oxford Dictionary back in 2011. However, as technology permeates almost every facet of our lives, the threat of online harassment is becoming more and more … More How to spot if your child is a victim of cyberbullying

Safe downloading habits: What to teach your kids

Even if you are careful about what you download, chances are your children will be less cautious. Here’s how you can help them – and your entire family – stay safe… Life without the internet is rather difficult to fathom, and particularly for children the online world holds a magical allure. While many parents are becoming … More Safe downloading habits: What to teach your kids

Five ways to make Halloween less cyber-scary for kids

How can we help kids avoid security horrors and stay safe from rogue online “neighbours” at Halloween and thereafter? It’s that time of year again when children, decked out in special costumes, roam the streets and ask for treats from neighbors. The online world, too, is inhabited by creatures that aren’t what they seem to … More Five ways to make Halloween less cyber-scary for kids

How to stay safe on public WiFi networks?

Every now and then it’s good to remind readers of some basic security measures. Although we’ve written about it before, it’s time to look at public WiFi security again. There are several potential dangers when using public WiFi, ranging from privacy issues to cybercrime attacks. But most can be easily avoided by following these simple … More How to stay safe on public WiFi networks?

Trends 2018: Doing time for cybercrime

Law enforcement and malware research join forces to take down cybercriminals. The primary purpose of malware analysis is to determine how a given piece of malware works, extract IOCs (Indicators of Compromise) and determine potential countermeasures. This work is almost purely technical in nature: it focuses on binary files and their properties. Results from malware analysis are … More Trends 2018: Doing time for cybercrime