FYI
Back to school cybersecurity: hints, tips, and links for a safer school year
Term time is upon us once more, and soon the summer holidays will be a thing of the past. We offer up some handy hints and tips for better back to school ...
8 everyday technologies that can make you vulnerable to cyberattacks
The security vulnerabilities of the latest developments in tech have been well documented. But what about everyday technologies that have been around for a while or are widely adopted? Here are eight ...
The danger of third parties: ads, pipelines, and plugins
We take a look at the perils of the tools and services embedded into the websites you use on a daily basis, thanks to the development help of third parties. Categories: FYI ...
A primer: How to stay safe on Amazon’s Prime Day Sale
While Amazon is poised for its fourth year run of Prime Day, the e-commerce giant’s annual flash sales event for Prime members, shoppers on the hunt for bargain deals are ready and ...
When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained
Maybe it’s the quirky way some tech writers abbreviate it, or the surreal way it reminded you of that popular Michael Jackson song. Whatever triggers you to remember the term, for most ...
Did my comment on your blog get lost?
Automatic filters on our blog sometimes catch benign comments in their nets. However, they also protect users from spammers, scammers, and malicious links. Read on to learn about our comment policy: what ...
Internet Safety Month: How to protect your child’s privacy online
This month is Internet Safety Month, and today we'll be talking about online privacy for children. For parents and caretakers, nothing could be more troubling than the thought of having your child's ...
Why bad coding habits die hard—and 7 ways to kill them
When it comes to poorly-written code, we're quick to point a finger at programmers, forgetting that they are beholden to the constraints of companies looking to push out tech product quickly. Thankfully, ...
Why tech companies wanted Senate Bill 315 vetoed
Georgia Senate Bill 315 aimed to make all unauthorized access to computers illegal—sounds good, right? Read why provisions in its fine print made tech and security companies more than uncomfortable. Categories: FYI ...
Parenting in the Digital World: a review
Parents don't just hand over the car keys to children who haven't taken driver's ed. Sadly, the same can't be said about smartphones. This book by Clayton Cranford shows parents the importance ...

