Skip to Main Content

All about doxxing: How it works and how to help prevent it 

It’s derived from the term “dropping docs (documents)” but what is doxxing exactly and how and why do people “dox” others? Join us in learning all about doxxing, what it could reveal about you, and why it can be so damaging to our personal and professional lives as well as extremely embarrassing. Above all, we

You probably know someone who’s been the victim of an attempted scam, where some fraudster tries to obtain sensitive information using a false identity or something similar. Cybercriminals also use this centuries-old “tradition” of deception, where they pretend to be someone we know or a reputable company to gain access to confidential data or to

The darknet — truly the dark side of the internet?

Many associate the darknet with the digital black market for everything that can only be obtained illegally: Drugs, weapons, viruses and malware, contract killers, poison, credit card numbers, all kinds of sensitive data, and so on. The darknet is situated on the dark side of the internet — after all, it’s also a synonym for

Why aren’t there virus scanners for iPhones?

Almost every day, there seems to be a new security warning about ransomware, phishing attacks, or some other digital threat. And while it may seem that Apple products such as Macs, iPads, and iPhones are immune, that isn’t the case. Learn why iOS devices are vulnerable to some of today’s most potent online threats and

It’s derived from the term “dropping docs (documents)” but...

Every device connected to the internet is assigned a...

​​There are many reasons to use your browser’s incognito...