Archive | Uncategorized

SIM card scam

How hackers can drain your bank account using the SIM card scam

These days, it’s tough to protect your personal information. Things like your name, date of birth, address, phone number, and of course Social Security number are all at risk, and with our reliance on social media and our willingness to share personal details online, hackers are finding it easier than ever to steal our identities. […]

Continue Reading · 0
FCC net neutrality

FCC claims repealing net neutrality has miraculously fixed broadband market

Just a handful of weeks after the scrapping of net neutrality regulations that prevented ISPs from creating internet fast lanes and throttling traffic, the FCC is now claiming that its changes are leading to a resurgence in the broadband internet market. The report states that “the marketplace is already responding to the more deployment-friendly regulatory […]

Continue Reading · 0
Net-Neutraility-Blog-Post-Hero-02

Our Commitment to Net Neutrality and Your Internet Freedom

December 14, 2017 will be remembered as the day when the Federal Communications Commission (FCC), the organization that was created to promote and support the freedom of communication in America, abandoned its mission and turned against its very purpose. Today, the majority of FCC commissioners voted to repeal the Net Neutrality protections that guaranteed many […]

Continue Reading · 31
Hotspot-Online_Security-071717

5 Little-Known Ways To Beef Up Your Online Security

2017 has been a year of major online security breaches. In the past six months, numerous cyber attacks such as WannaCry and Petya/NotPetya have affected countless users across the globe. Cybercriminals are taking advantage of our lapses in securing our information, so this means you have to be proactive in protecting yourself whenever and wherever […]

Continue Reading · 0
net neutrality

Current Challenges Facing Net Neutrality

  In the simplest of terms, net neutrality refers to the principle that Internet Service Providers (ISPs), governments, or any other parties regulating the internet should treat all data the same. These regulatory bodies cannot charge differently based on variables such as the user, the type of content, the type of equipment used, and a […]

Continue Reading · 1
AnchorFree-Attack_Vectors-061417

The Most Common Attack Vectors Used By Cybercrooks Today

As technology develops further and tools for connectivity become more efficient in their use and operation, it also becomes easier for hackers and cyber criminals to disrupt our devices. With so many of us reliant on our phones, laptops, and other devices, we have multiple ways to access important tools and information – and multiple […]

Continue Reading · 0
Malware Security VPN

Malware attacks via subtitles: Here’s what you need to know

In recent years, we have seen the emergence of new attack vectors that made the Internet even more dangerous for users. Cyber crooks continue to think outside the box, allowing them to develop threats nobody thought were possible before. Today, images can carry malicious code, and ransomware can force victims to infect others if they […]

Continue Reading · 1