...

Cryptography

MAYDAY!: The Threat of GPS Jamming in Aviation

Most of us step onto an airplane, knowing very little on how exactly we’re going to get to our destination. We board the plane, hope the pilots didn’t consume any mini bottles of alcohol before they sat in the flight deck, then arrive at our destination. For flights to get to their intended destination, modern […]

MAYDAY!: The Threat of GPS Jamming in Aviation Read More »

Encryption Apps: What They Are and Why You Should Use Them

When you send a message using your favorite instant messenger app like WhatsApp or Facebook Messenger, have you ever wondered if it’s truly safe from prying eyes? With so many cyber threats out there, from hackers to invasive surveillance, protecting your personal information is more important than ever. Encryption apps provide a simple yet effective

Encryption Apps: What They Are and Why You Should Use Them Read More »

Masquerading Malware: How It Evades Detection and What to Do About It

Just when we thought we had a handle on malware, cybercriminals have presented us with a type of malware that is so much more difficult to deal with.  Masquerading malware is a sophisticated cyber threat that disguises itself as legitimate software to bypass even the most advanced security systems. If you’ve ever wondered how malicious

Masquerading Malware: How It Evades Detection and What to Do About It Read More »

Google Password Manager: Your Guide to Securing Your Online Accounts

When I started out in this whole computer thing I had only one password to remember, my very first email, and still sometimes I forgot the damn thing, and no, it wasn’t “password”. But as time went on, and I had more and more accounts, so did the number of passwords. I had so many

Google Password Manager: Your Guide to Securing Your Online Accounts Read More »

Image of a man looking at a screen showing his email.

How to Clean up Emails and Subscriptions: Step-by-Step!

Every time I open my inbox, it seems like ten more emails have been added to the list. Many of these emails come from subscriptions, promotions, and newsletters I can’t even remember I had. If you’re like me, being bombarded by emails can be a pain.   Cleaning up emails and managing subscriptions doesn’t just

How to Clean up Emails and Subscriptions: Step-by-Step! Read More »

My Multi-Factor Authentication Guide: Why Two Keys Are Better!

  Let’s say you have a metal chest, and that chest contains all your prized possessions. You secure it with a simple padlock. So how safe are the items in that chest? After all, the chest is only being secured with one padlock. But what if, in addition to the padlock, you had another lock.

My Multi-Factor Authentication Guide: Why Two Keys Are Better! Read More »

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.