-
Should you get a burner phone?
You know the movie trope: A spy, fugitive, or criminal utters something into a phone, then snaps it in half or takes it apart (with one hand, no less), as pieces litter the ground. But even you, assum...
-
How to boost Wi-Fi signal at home to get faster internet
It won't surprise anyone to learn that internet usage has surged dramatically since the Covid-19 pandemic started, thanks to much more time spent at home. This makes the speed and strength of our Wi-F...
-
What are white hat, gray hat, and black hat hackers?
You’ve seen the headlines. Data stolen. Computer networks locked. Private information leaked. Whenever hackers are mentioned in the media, it's almost always in a negative light. While it’s true t...
-
Cybersecurity tips for small businesses
While it’s tempting to assume that hackers aren’t interested in small businesses as targets, that couldn’t be further from the truth. In fact, small businesses could be seen as easier targets by...
-
How to stop receiving spam emails
A spam email, also known as junk email, is an unsolicited message sent out in bulk, typically for advertising products and services to you. Not only are they annoying, but they can also contain variou...
-
8 tips for online safety this travel season
This holiday season, whether you're visiting family or getting away from it all, don’t let your guard down when using your devices away from home. Sure, it’s nice to think about unplugging for the...
-
What is a firewall & how does it work
Imagine leaving your front door unlocked. Anyone—or anything—could wander in without warning. The same goes for your digital life. A firewall is the invisible guard that checks everything trying t...
-
What is perfect forward secrecy? Learn how it protects your privacy
Encryption is a crucial part of online security, but what happens if a cybercriminal finds the key to undo encryption and gain access to your data? It’s a scary prospect, but perfect forward secrecy...
-
What is the browser-in-the-browser (BitB) attack?
You've been warned not to click on suspicious email attachments designed to steal your information, or not to open sketchy links sent to your LinkedIn inbox that can install malware onto your computer...
-
5 common apps that put your privacy at risk
In the cold Canadian winter, there’s nothing like a cup of Tim Hortons hot chocolate. With their app, it’s easier than ever to customize and order your favorite hot drink. However, you might not w...
Tips & tricks
