Articles by Aviva Zacks

Aviva Zacks is a content manager, writer, editor, and really good baker. When she's not working, she enjoys reading on her porch swing with a cup of decaf.

Parents’ Guide for Safe YouTube and Internet Streaming for Kids
Parents’ Guide for Safe YouTube and Internet Streaming for Kids

You work hard to keep your children safe from so many different dangers, but every day they are exposed to countless threats online. Predators, disturbing content, identity theft attempts, and other things you wouldn’t let them experience in real life are all waiting for them.

Shockingly, 1 in 5 U.S. teenagers say they have been approached in a sexual way by strangers online; only 25% told their parents.

As a parent, that’s terrifying.

Aviva Zacks by Aviva Zacks January 1, 2019
5 Ways to Keep Hackers from Hijacking Your Phone Number
5 Ways to Keep Hackers from Hijacking Your Phone Number

A friend calls you to go out for drinks this evening, but the voice on the other end of the line isn’t you. Your friend double-checks the number. He’s not mistaken. You’ve become one of the countless individuals who have their phone number stolen by cyberjackers every year.

Aviva Zacks by Aviva Zacks December 23, 2018
Interview With Rebekah Moody – ThreatMetrix
Interview With Rebekah Moody – ThreatMetrix

Safety Detective interviewed Rebekah Moody, Director of Fraud and Identity, at ThreatMetrix, which develops tools to help businesses prevent online fraud. Here’s what we found out:

Interview With Rebekah Moody – ThreatMetrix

Aviva Zacks by Aviva Zacks December 20, 2018
How Do I Protect My Computer While Streaming Videos Online
How Do I Protect My Computer While Streaming Videos Online

If you stream videos online, you may have seen a few unpleasant popups, like NSFW ads for porn websites. Unfortunately, one wrong click can infect your computer with malware. Then a hacker can steal your passwords, credit card info, and other private information. Luckily, there are a number of different ways to protect yourself and your computer when streaming videos online.

Aviva Zacks by Aviva Zacks December 19, 2018
5 Ways to Protect Your Amazon Fire TV from Malware
5 Ways to Protect Your Amazon Fire TV from Malware

Your Amazon Fire TV may be doing more than streaming your favorite shows—it might also be mining for Bitcoin. Oh sorry, you’re not going to get those Bitcoin, the person who infected your system with cryptojacking malware will.

Aviva Zacks by Aviva Zacks December 16, 2018
Top 10 Attacks by Facebook Hackers and How to Stop Them
Top 10 Attacks by Facebook Hackers and How to Stop Them

As recent news has shown, Facebook isn’t all fun and games. The world’s most popular social network is prime fishing ground for cybercrooks, so it’s crucial that you know their tactics. Here are 10 of the most frequently used Facebook hacking scams—and the software and know-how you need to outsmart them.

Aviva Zacks by Aviva Zacks December 16, 2018
Interview With Bill Ho – Biscom CEO
Interview With Bill Ho – Biscom CEO

Bill Ho is the CEO of Biscom, which provides the world’s most secure messaging solutions for the enterprise environment. A technology leader with a background in software engineering, Bill believes in using tools and data to solve difficult problems – while maintaining the highest standards of cybersecurity.

Interview With Bill Ho – Biscom CEO

Aviva Zacks by Aviva Zacks December 16, 2018
Hackers Love IoT Products: Here’s How to Keep Them Out
Hackers Love IoT Products: Here’s How to Keep Them Out

The Internet of Things (IoT) has already changed modern society. Without any kind of specialized technical training, users can take control of their homes remotely, use “smart home” sensors to manipulate thermostats, turn on and off their air conditioners, and even keep track of what products they have in their fridge.

Aviva Zacks by Aviva Zacks December 12, 2018
Ethical Hacking: What It Is and How To Do It
Ethical Hacking: What It Is and How To Do It

The word “hacking” has a seriously negative connotation, but there is a kind of hacking that benefits us all. “Ethical hacking,” also known as “white hat” hacking, happens with the explicit consent of the organization or website they are targeting to test out the security of their defenses. The process is known as “penetration testing,” or simply “pentesting.”

Aviva Zacks by Aviva Zacks December 12, 2018
Trojans on Your Android? Here’s How to Keep Your Device Safe in 2019
Trojans on Your Android? Here’s How to Keep Your Device Safe in 2019

If you’re an Android device owner, you’ve possibly heard some myths about security. Like most Android users, you probably download your apps from the Google Play Store and hopefully notice a tick symbol indicating that the app has been scanned by Google Play Protect, Google’s built-in malware detection engine.

Aviva Zacks by Aviva Zacks December 12, 2018