172 articles

Privacy and Identity Protection

Is it safe to buy from Shein?

Is it safe to buy from Shein?

Privacy and Identity Protection

Is it safe to buy from Shein?

Large e-commerce platforms and their databases are always popular targets for cybercriminals.

Ben Tudor17 Mar 2026


Privacy and Identity Protection

How to remove your personal information from the internet: A step-by-step guide

How to remove your personal information from the internet: A step-by-step guide

Privacy and Identity Protection

How to remove your personal information from the internet: A step-by-step guide

Your digital footprint reveals personal data that puts your security and privacy at risk. Here’s how to audit your exposure, remove PII, and stop it from resurfacing.

Phil Muncaster10 Mar 2026


Family Safety Online

Playing it safe: How to spot and fight cyberbullying in online games

Playing it safe: How to spot and fight cyberbullying in online games

Family Safety Online

Playing it safe: How to spot and fight cyberbullying in online games

Children have started gaming earlier than ever, some even before the age of five. How can you shield them from possible cyberbullies and keep the experience safe?

Roman Cuprik03 Mar 2026


Device Protection

Old threats, novel tactics: Android users face new AI security challenges

Old threats, novel tactics: Android users face new AI security challenges

Device Protection

Old threats, novel tactics: Android users face new AI security challenges

ESET Research reveals how cybercriminals have improved their malicious campaigns.

Roman Cuprik02 Mar 2026


Device Protection

Why Internet of Things (IoT) devices remain easy targets for hackers

Why Internet of Things (IoT) devices remain easy targets for hackers

Device Protection

Why Internet of Things (IoT) devices remain easy targets for hackers

Is IoT adoption a double-edged sword? Discover why our homes and businesses are paradoxically becoming less secure with the rise of connected devices.

Márk Szabó23 Feb 2026


Privacy and Identity Protection

Docusign phishing emails: How to spot and stop attacks before it’s too late

Docusign phishing emails: How to spot and stop attacks before it’s too late

Privacy and Identity Protection

Docusign phishing emails: How to spot and stop attacks before it’s too late

Docusign attacks are growing more sophisticated. Small businesses should strengthen their defenses through advanced cybersecurity and awareness training.

Phil Muncaster17 Feb 2026


Privacy and Identity Protection

What is typosquatting, why does it matter, and how do I tackle it?

What is typosquatting, why does it matter, and how do I tackle it?

Privacy and Identity Protection

What is typosquatting, why does it matter, and how do I tackle it?

Typosquatting attacks abuse look-alike domains and user typos to steal credentials, spread malware and hijack traffic. Learn how modern typosquatting works in 2026, the main attack types, and how users, security teams and brands can prevent it.

Phil Muncaster12 Feb 2026


Family Safety Online

Help young gamers dodge Fortnite’s risks

Help young gamers dodge Fortnite’s risks

Family Safety Online

Help young gamers dodge Fortnite’s risks

Fortnite is more than just a popular game. It’s a social space where children play, communicate, and form habits that reach beyond the screen. What are its main risks, and how can parents help kids have a safer experience?

Roman Cuprik05 Feb 2026


Family Safety Online

Raising confident YouTube kids: A parent's safety guide for 2026

Raising confident YouTube kids: A parent's safety guide for 2026

Family Safety Online

Raising confident YouTube kids: A parent's safety guide for 2026

Help your child understand YouTube, set healthy boundaries, and guide them toward safe, confident viewing habits.

Roman Cuprik07 Jan 2026