A threat to your online security hiding in plain sight

Open/download audio

With the internet of things, you can open doors and turn on lights with one tap on your phone. That’s a lot of power — so what happens when a hacker takes over your home network? Kim speaks with Cequence Security hacker Jason Kent, who shares some scary stories about what can happen if you aren’t careful. You’ll also get a ton of cybersecurity tips to make sure your online security is airtight!

Learn more about your ad choices. Visit megaphone.fm/adchoices


6 essential features you need in a home security system

Most people who don’t have home security systems yet are probably still planning on installing one in the future. How many times have you left your home thinking, “I wish I had some kind of protection system in place?”

Continue reading

More pandemic checks coming - Don't be fooled by bogus emails

With plenty of scams to go around, cybercriminals are tapping into news events to formulate new tactics. Just like the emails copying the events around the Colonial Pipeline ransomware attack, criminals are using the nationwide American Rescue Plan Act as bait, and thousands are being scammed.

Continue reading

Popular baby rocker recalled after 4 deaths - Share this with friends and family

Before products get released on to the market, they usually go through a stringent testing period. They will only be sold once all the necessary regulatory approvals have been given. But sometimes, things don’t go according to plan, and they get recalled.

Continue reading

Warning: Email promising protection from ransomware is actually malware

Throughout history, there have been several high-profile security breaches and malware attacks. One of the more infamous happened in 2011 when a hacker breached the PlayStation Network. This exposed the details of 70 million people.

Continue reading

Simple tricks to speed up your smartphone

Think back to your first cellphone. Beyond making calls and playing Snake, there wasn’t much to do. Today, you carry a full-fledged computer everywhere you go.

Of course, now we’re all on our phones more than ever. Hackers know that and pump out fake apps and clever scams in hopes of infecting your phone. Tap or click for a list of fake apps that mimic real ones. They’re super convincing.

Continue reading

5 hidden ways Google Voice can make your life easier

Thanks to the ubiquitous adaptation of smartphones, you no longer need to remember phone numbers. Can you recite from memory any digits you have received during the past few years? Your own number is different, however. You’ve had it forever and it’s followed you from phone to phone like an old friend.

Continue reading

Photography tip: Should you shoot in JPEG, TIFF or RAW?

When it comes to working with photos, there are many container formats you may find yourself working with from time to time. This may not affect you much if you’re only saving photos from the internet to your computer in your leisure time, but it’s something photographers must contend with often.

Continue reading

Have a Ring camera or doorbell? Big change to how police can request your videos

Look around the next time you go to the shops or to fetch the kids from school. If you pay attention, you will notice that there will almost always be a security camera point in your direction. Whether it’s at a gas station or on the freeway, they are everywhere.

Continue reading

Blackmail warning: Hackers are sending X-rated emails

Scammers know all the tricks to catch potential victims in their data-stealing traps. Hidden malware, fake advertising, or bogus phishing apps are all part of a cybercriminal’s technological arsenal. But there is one aspect that scammers frequently target: the human mind.

Continue reading

5 signs your smartphone is about to bite the dust

Though we are well into the digital age, many electronics are still large investments, extending beyond their price tags. From phones to tablets to computers, you spend time and money making your device yours. It has your stuff on it, and it’s set up to your liking.

Continue reading