Self-Monitored Security System Market heating up

The Angee home security system is the only one with a video camera that rotates 360 degrees as it detects motion. And this high definition camera has smart zones; you can set up specific zones for monitoring. But Angee is more than just a video surveillance setup. It’s a self-monitored home security system, points out an article on

Butthead Burglar buttdials Cops

You know what a “buttdial” is. This is when a person has a seat somewhere, and the ensuring pressure of their butt against the seat accidentally presses upon the keypad of the phone that’s in their pocket. Or they don’t lock their phone and their fingers indiscriminately just call someone. Happens a lot....more

Beware of Apple ID Phishing Scams

You may have been scammed after you responded to an e-mail that appears it came from Apple. When hackers send e-mails that appear to come from a legitimate company like Apple (or Google, Microsoft, PayPal, etc.), with the objective of tricking the recipient into typing in passwords, usernames, credit card information and other sensitive data, this is called phishing....more

What is a Password Manager?

Many people, including myself, make mistakes with their passwords and use them on site after site. To remain safe, it’s important to use a unique, strong password on every site you visit. How do you do this the easy way? Use a password manager....more

12 Ways to secure your Home

The FBI says that in the U.S., one out of every 36 homes will be raided by thieves in any given year. Often, the burglars were able to get in due to the residents’ carelessness....more

Dust off your digital devices inside and out

Hackers know small companies are more vulnerable to data breaches due to limited resources. Cybersecurity should always be a high priority. But when a company’s IT staff consists of maybe 1-2 people who are provided limited budgets and are constantly solving other tech problems, the focus on security suffers. And hackers aren’t the only problem. One significantly overlooked part of the security process “cleaning” the IT infrastructure....more

8 Tips to protect your Money – and your Identity – from Theft

When you hear the dictum, “You should protect yourself from identity theft,” do you equate this with pushing a wheelbarrow loaded with rocks up a hill? It would actually be more accurate to picture slicing into a fresh apple pie, because identity theft protection is as easy as pie. Check out the following things you should do—without breaking any sweat:...more

Why use a VPN?

If you want to be a pro at privacy, here’s a tip: When it’s time to go online, whether it’s at an airport lounge, coffee house, hotel, or any other public Wi-Fi spot, don’t log into any of your accounts unless you use a virtual private network (VPN)....more

How to Stop Sharing Your Location Information

The Internet helps us connect and share with people around the world, but there are some people with whom you definitely shouldn’t be sharing your information. Although it’s not pleasant to think about, it’s not just friends and family that can see your online posts, bad guys can too, including criminals and even sex offenders....more

What is a Hacker?

You probably think you know what a “hacker” is, but the images portrayed in the media can be misleading. You may be thinking of a geeky-looking guy who causes peoples’ computers to get infected with viruses or cracks passwords to raid the accounts of big business. This is one kind of hacker, but in a broader sense a hacker is a person (male or female) who uses their programming skills and technical knowledge to create and modify computer software and hardware by finding their weaknesses and exploiting them....more