Kids seem to be glued to YouTube these days. As a parent, it can be daunting to try and police the content that they watch. What's a parent to do?
In our featured article: YouTube Parental Controls, we'll show you a couple of steps you can take to attempt to enforce some parental controls. Note: there is no guarantee that the controls mentioned in the article will be effective or that your kids won't circumvent them altogether, but at least doing something is probably better than doing nothing at all.
Have you found YouTube's parental controls to be effective or not? Let us know your thoughts in the comments area:
Craigslist can be both a fun and scary place. You never know what you'll find for sale, and you often don't know who is on the other end of that sale until you complete the deal.
In our featured article: How to Buy and Sell Safely on Craigslist, we'll give you some security tips to help make your Craigslist experience a safer one.
Have you ever had a bad Craigslist experience? Tell us your story in the comments section below:
IT security jobs are still in high demand, especially given the fact that cyber crime seems to be a constant fixture in the news with data breaches becoming an almost daily occurrence.
Have you thought about a career in the cyber security field? Check out our article: Tips to Help You Land an IT Security Job for some advice on what you can do to help get your foot in the door in this lucrative field.
Do you have a job in IT security? What do you think helped you get the job? Share your story in the comments section:
There is a new scam sweeping through Australia and other parts of the world this week. Victims are having their iPhones locked remotely by hackers who apparently compromised their iCloud account credentials. The victims are then being issued ransom demands via the lock screen. Victims are told that if they pay the ransom then they will be given the code to unlock their phones.
This scam takes advantage of the 'lost mode' feature of Find My iPhone. In this week's featured article: How to Protect Yourself From iPhone Device Lock Ransom Scams, we'll show you what you can do to help secure your phone so you don't become a victim, we'll also tell you what to do if you've already been hit by this scam.
Have you already become a victim of this scam? Let us know your experience in the comments section:
Like it or not, Facebook is here to stay. Some companies allow employees to use Facebook at work and some strictly prohibit it. If your company allows it then you might want to continue reading.
In this week's featured article, we'll ask the question: Are Your Employees Leaking Company Data On Facebook? We'll tell you what might be leaking and how. We'll also check out some things you can do to help prevent data leakage via social media.
Does your company allow Facebook at work? Let us know in the comments section below:
Securing your PC doesn't have to take hours and hours of your time. There are a lot of things you can do in just a few minutes to help improve your security posture.
In this week's featured article: The 10-minute PC Security Tune-up, we'll show you some quick tips to get you started on the road to a secure PC.
Do you have a security tip that you would like to share with us? Tell us about it in the comments section below:
Did you just try to Google something but instead of going to Google, your browser took you to some strange search engine you've never heard of?
You might have just become a victim of browser hijacking. In this week's featured article: How to Prevent Browser Hijacking, we'll learn about browser hijacking, including how it happens, why it happens, and how you can try and prevent your browser from getting hijacked.
Have you ever had your browser hijacked? We're you able to resolve the problem or is it still happening? Let us know your experience in the comments section below:
Have you ever been clickjacked? While it may sound like some kind of pro wrestling move, I assure you it is not.
Clickjacking is a security threat that users all over the world are experiencing. How can you stay safe from clickjacking? Check out our article: How to Protect Yourself From Clickjacking Attacks for information on how you can avoid becoming a victim.
Have you ever been clickjacked? Let us know your experience in the comments area below:.
Google+ seems to be slowly gaining some traction. It's probably not quite the big Facebook contender that Google had hoped it would be, but it is gaining steam
Just like Facebook, Google+ has privacy and security settings that you should configure to keep yourself safe. Check out our article on Google+ Privacy, Security and Safety for information on configuring the various security and privacy settings offered by Google+.
Do you use Google+? How do you think it compares with Facebook? Tell us your thoughts in the comments area:
You've just discovered that your PC has been hacked. You could run away and go hide in a corner, or you can take action and do something about it.
If you opt for taking action, then you need to check out our article: I've Been Hacked! Now What? We'll show you the steps you need to take right now, before any more damage is done.
Have you recently had your computer hacked? Did you start over from scratch or did you try to fix the problem without reloading? Let us know in the comments section.