Ray Fernandez

Ray Fernandez

28% of Mac users think macOS is malware-free, Moonlock survey finds (Header image)
If there is anything cybersecurity experts can agree on, it’s that 2023 has been a wild rollercoaster ride so far. Undoubtedly, the modern threat landscape is leveling up and becoming more sophisticated every...
Jul 17, 2023
7 min read
The simple questions about your privacy that ChatGPT struggles to answer (Header image)
You go online and find the new ChatGPT AI bot. After chatting with it for a while, you have shared all kinds of personal information. Perhaps you mentioned your name, the names of...
Jul 17, 2023
13 min read
Russia was expected to wipe out Ukraine in cyber war. It hasn’t. (Header image)
It’s been over a year since Russia’s invasion of Ukraine began. Cities have been devastated, international sanctions applied, hundreds of thousands of fighters and civilians on both sides killed or injured, and millions...
Jul 17, 2023
10 min read
After 5 years of GDPR, are your privacy rights better protected? (Header image)
May 25 marks the fifth anniversary of the General Data Protection Regulation (GDPR). The law was adopted in the EU in the aftermath of the Cambridge Analytica scandal. Cambridge Analytica shocked the world...
Jul 17, 2023
13 min read
Hashing vs encryption vs encoding: The differences explained (Header image)
Our digital world runs on data. And data needs to be constantly formatted, verified, and secured. Every day, your data is encoded, encrypted, or hashed when you go online to write an email,...
Jul 17, 2023
5 min read
10 great webcam covers that shield you from prying eyes (Header image)
Ever had the feeling that you’re being watched when you’re using your laptop? Or do you worry when the webcam light flickers? A camera lens, even a small one, always open and staring...
Jul 17, 2023
10 min read
What is white hat hacking? Here's how ethical hacking works (Header image)
When most people hear the word “hacker,” they often think of the usual stereotype: an evil cybercriminal in a hoodie, hunched over a computer in a dark room. In a way, we have...
Jul 17, 2023
10 min read
Not all skills used by hackers and cybercriminals relate to computing. In fact, when coding gets a hacker nowhere, they turn to a classic technique used by scammers and con artists: social engineering....
Jul 17, 2023
8 min read
Red hat hacking: Understanding the vigilante hacker (Header image)
Hackers wear many “hats.” There’s black hat hacking, but there’s also white hat, green hat, blue hat, red hat, and others. Some do it for the money. Others seek to cause havoc and...
Jul 17, 2023
10 min read
What is WebHelper, that suspicious process in your Task Manager? (Header image)
Is your computer running slow? Do you see too many ads and pop-ups? If so, your Mac might be infected with WebHelper, one of those malicious apps that has given users worldwide nothing...
Jul 17, 2023
5 min read