View all Privacy & Safety Articles

What to do to protect yourself if your phone is lost or stolen
Use our step-by-step instructions as a guide on how to protect yourself and your personal data if your smartphone is lost or stolen.
Read more
What is SIM swapping & how does the hijacking scam work?
Learn how you can prevent SIM swapping, a method used by fraudsters to transfer your phone number to their SIM card and gain access to your online accounts.
Read more
What is scareware?
Don’t be spooked by scareware, malware that manipulates users into downloading software or visiting sites that infect their device with a virus. Learn how to protect yourself against it.
Read more
What is malvertising?
Get to know the ins and outs of malvertising, one of the sneakier cybercrimes. Learn how malvertising works and the actions you can take to keep your devices and data safe.
Read more
What is a honeypot attack?
A honeypot acts as a decoy network or server to distract cybercriminals or to learn your own network’s weaknesses against hackers. Explore different types of honeypots here.
Read more
What is biometric data?
Biometrics are a set of unique physical characteristics like fingerprints that are used for identification. Learn how biometrics are being used for security and how to keep your data safe.
Read more
What is an IP address spoofing attack?
IP spoofing is a malicious attack used by cybercriminals to infect devices with malware, crash your server, or steal data. This stealthy type of attack allows cybercriminals to pose as another computer system or hide their identity. Every website, server, and device that connects to the Internet receives an IP (Internet protocol) address. Each IP […]
Read more
What is a wardriving attack?
Take steps to protect your home network against potential wardriving attacks to keep your personal data safe. Find out more about wardriving and how to prevent it.
Read more