Tech News Blog
Crown CEO’s Six Most Useful Alexa Features
Everyone has access to a virtual assistant these days, since they’re integrated into a lot of devices around us…
7 Awesome Reasons to Use Android Auto or CarPlay
If you drive an older car, you may not be making the most of your navigation and entertainment options in the car…..
Browser in the Browser Attacks, Single Sign-On, and the New Phishing Threat
A new phishing technique is making a big splash in the tech world, because it makes phishing pages appear as if they are trusted, legitimate sites….
Cyber Threats, Data Leaks, and Credit: What you Should Know
It’s easy to lose sight of the fact that major corporations face the same challenges, just at a much larger scale…
Keep your IoT an Internet of Things, not an Internet of Threats
Internet-connected appliances can be pretty cool… If you have an Alexa-integrated coffee machine or WiFi-connected vacuum cleaner …
Reactive Network Defense with Honeypots
Today, we’ll discuss another strategy for securing your networks: the honeypot.
Staying One Step Ahead with Mobile Device Security
A lot of us use a mobile device (a phone or tablet) so frequently that we consider it to be our primary computer.
Be on the Lookout for these Popular Social Engineering Scams
Personal information has never been under so much threat from bad actors.
Top 11 Wireless Home Network Security and Usability Tips
WIFI is great for network access. Just be careful who’s accessing your networ…