Can You Disappear From the Internet?

The idea of removing all traces of yourself from the internet can be appealing, but how would you do it? Is it even possible? We will discuss the steps to erase or reduce your digital footprint, from minimizing your digital footprint to invoking the “nuclear option.” Expert: Bruce R. Mendelsohn…

Continue Reading

Romancing the Scam

Continue Reading

Malware is Still Going Strong

Continue Reading

Is Cryptocurrency a Scam?

Continue Reading

Credit Bureaus are Still Unsecure

Continue Reading

Ransomware Crooks Up Their Game

Continue Reading

Should You Unsubscribe From Spam Texts and Emails—or Not?

Continue Reading

COVID, Telemedicine and Insurance Fraud

Continue Reading

The Dangers of Push Notifications

VWO.com defines push notifications as “clickable pop-up messages that appear on your users’ browsers irrespective of which device they use or which browser they are on.” You may choose to allow push notifications from websites or apps you use regularly to keep you informed of news and updates that you…

Continue Reading

Secret Dots Track Documents to Your Printer

Do you use a color laser printer in your home or office? If so, it almost certainly adds identifying code to all of your documents telling the date and time a document was printed along with the printer’s serial number. How does it work? In one method, the printers add…

Continue Reading

FEATURED PODCAST: SOCIAL ENGINEERING: ARE YOU THE WEAKEST LINK IN YOUR SECURITY?

Social engineering attacks manipulate users into giving up information wanted by the hackers. They often involve email or other communication to invoke urgency, fear or other emotions in the victim, leading them to reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, it can be difficult to prevent these kinds of attacks. The best hope of protecting yourself, your family and your company from social engineering attacks is to be aware of how they work and educate yourself and other users on how to avoid becoming a victim. In this interview, we discuss how to recognize a possible social engineering scam and how to deal with them.

Listen Now