What are some of the most common warning signs that your child is experiencing online harassment? Cyberbullying is by no means a new phenomenon; in fact, the term was added to the Oxford Dictionary back in 2011. However, as technology permeates almost every facet of our lives, the threat of online harassment is becoming more and more … More How to spot if your child is a victim of cyberbullying
Even if you are careful about what you download, chances are your children will be less cautious. Here’s how you can help them – and your entire family – stay safe… Life without the internet is rather difficult to fathom, and particularly for children the online world holds a magical allure. While many parents are becoming … More Safe downloading habits: What to teach your kids
We all know parenting is one of the hardest jobs many of us will ever do, and some would say it’s getting even more difficult when considering the growing dangers children face online. As technology continues to expand with new digital platforms, so too does the potential for risk to occur. It’s important for parents … More Keeping kids and parents safe online
How can we help kids avoid security horrors and stay safe from rogue online “neighbours” at Halloween and thereafter? It’s that time of year again when children, decked out in special costumes, roam the streets and ask for treats from neighbors. The online world, too, is inhabited by creatures that aren’t what they seem to … More Five ways to make Halloween less cyber-scary for kids
Every now and then it’s good to remind readers of some basic security measures. Although we’ve written about it before, it’s time to look at public WiFi security again. There are several potential dangers when using public WiFi, ranging from privacy issues to cybercrime attacks. But most can be easily avoided by following these simple … More How to stay safe on public WiFi networks?
Two-factor authentication is an underutilized security measure in businesses, yet it can greatly improve the security of an account. it is also recommended as one of the key factors in helping keep data secure in compliance with GDPR. Receiving an extra code to your phone when signing in, is a great obstacle for would-be hackers … More Google Gmail’s Two-Factor Authentication. Know how to set it up? It’s easy!
Law enforcement and malware research join forces to take down cybercriminals. The primary purpose of malware analysis is to determine how a given piece of malware works, extract IOCs (Indicators of Compromise) and determine potential countermeasures. This work is almost purely technical in nature: it focuses on binary files and their properties. Results from malware analysis are … More Trends 2018: Doing time for cybercrime