Articles by Aviva Zacks
Aviva Zacks is a content manager, writer, editor, and really good baker. When she's not working, she enjoys reading on her porch swing with a cup of decaf.
You work hard to keep your children safe from so many different dangers, but every day they are exposed to countless threats online. Predators, disturbing content, identity theft attempts, and other things you wouldn’t let them experience in real life are all waiting for them.
Shockingly, 1 in 5 U.S. teenagers say they have been approached in a sexual way by strangers online; only 25% told their parents.
As a parent, that’s terrifying.
A friend calls you to go out for drinks this evening, but the voice on the other end of the line isn’t you. Your friend double-checks the number. He’s not mistaken. You’ve become one of the countless individuals who have their phone number stolen by cyberjackers every year.
Safety Detective interviewed Rebekah Moody, Director of Fraud and Identity, at ThreatMetrix, which develops tools to help businesses prevent online fraud. Here’s what we found out:
If you stream videos online, you may have seen a few unpleasant popups, like NSFW ads for porn websites. Unfortunately, one wrong click can infect your computer with malware. Then a hacker can steal your passwords, credit card info, and other private information. Luckily, there are a number of different ways to protect yourself and your computer when streaming videos online.
Your Amazon Fire TV may be doing more than streaming your favorite shows—it might also be mining for Bitcoin. Oh sorry, you’re not going to get those Bitcoin, the person who infected your system with cryptojacking malware will.
As recent news has shown, Facebook isn’t all fun and games. The world’s most popular social network is prime fishing ground for cybercrooks, so it’s crucial that you know their tactics. Here are 10 of the most frequently used Facebook hacking scams—and the software and know-how you need to outsmart them.
Bill Ho is the CEO of Biscom, which provides the world’s most secure messaging solutions for the enterprise environment. A technology leader with a background in software engineering, Bill believes in using tools and data to solve difficult problems – while maintaining the highest standards of cybersecurity.
The Internet of Things (IoT) has already changed modern society. Without any kind of specialized technical training, users can take control of their homes remotely, use “smart home” sensors to manipulate thermostats, turn on and off their air conditioners, and even keep track of what products they have in their fridge.
The word “hacking” has a seriously negative connotation, but there is a kind of hacking that benefits us all. “Ethical hacking,” also known as “white hat” hacking, happens with the explicit consent of the organization or website they are targeting to test out the security of their defenses. The process is known as “penetration testing,” or simply “pentesting.”
If you’re an Android device owner, you’ve possibly heard some myths about security. Like most Android users, you probably download your apps from the Google Play Store and hopefully notice a tick symbol indicating that the app has been scanned by Google Play Protect, Google’s built-in malware detection engine.