Mobile pay is here to stay — and getting better and faster
Mobile payments are getting easier and faster. See what’s new and notable in payment apps, while learning how to make them more secure, too.
Mobile payments are getting easier and faster. See what’s new and notable in payment apps, while learning how to make them more secure, too.
Explore topics
14 days of FREE* comprehensive antivirus, device security, and online privacy.
Join today. Cancel anytime.
*Terms Apply
Browsing on your Android while on the go? Learn how a VPN helps protect your browsing activity on your Android smartphone or tablet, especially while using public Wi-Fi.
There are currently over 4 million apps available across various mobile platforms. It's virtually impossible to keep track of each and every app on all of your devices, whether it is a shared...
Mobile scams and malware are on the rise, and scammers are evolving to get smarter at tricking you into giving up your data. Review the many different types of mobile scams below and the best ways to identify them and keep your data safe.
Although WiFi has greatly increased convenience for laptop and smartphone users, it’s also opened up a significant number of security risks. Here’s how you can protect yourself from these threats.
The Internet of Things or IoT: It’s a phrase you may have seen or heard as our world grows more connected by the day. But what does it mean?
The connected home is focused on ease of use and convenience. Have you ever left the house and wondered if you turned the heater off, or locked the front door? Well, with the connected home, there’s an app for that!
Small vulnerabilities in your home Wi-Fi network could cause problems. Learn how to secure your Wi-Fi connection in 7 simple steps.
A honeypot is a computer or computer system intended to mimic likely targets of cyberattacks. Learn more about what a honeypot is and how it works.
Most people don't know that you don’t have to intentionally download a malicious attachment to compromise your computer’s security.
You might have heard that hackers can access your webcam. In the age of the Internet of Things, that’s a pretty scary notion.
Spear phishing is a targeted cyberattack toward a specific individual or organization with the end goal of receiving confidential information for fraudulent purposes
If you’re like most people, you don’t read the Terms of Service when you get a new app or buy a new device. That’s a big mistake, because a lot of apps on the market that are less-than-ideal, known as “grayware,” count on you allowing them access to your information.
Social media accounts are powerful tools in the wrong hands. Weve recently seen hackers take over the Twitter accounts of media outlets and large corporations, using them for anything from basic spam...
How online creeping and cyber stalking differ, the most common cyber stalking tactics, and where we are with stalkerware today
Facebook isn’t that private, unless you take the steps to make it that way. If you’re not careful, you’ll be sharing your posts with people you’ve never met, online or offline
Want more?
Follow us for all the latest news, tips and updates.