Ray has been covering tech and cybersecurity for over 15 years. His work has appeared on TechRepublic, VentureBeat, Forbes, Entrepreneur, and the Microsoft Blog, among others.
Our digital world runs on data. And data needs to be constantly formatted, verified, and secured. Every day, your data is encoded, encrypted, or hashed when you go online to write an email,...
Ever had the feeling that you’re being watched when you’re using your laptop? Or do you worry when the webcam light flickers? A camera lens, even a small one, always open and staring...
When most people hear the word “hacker,” they often think of the usual stereotype: an evil cybercriminal in a hoodie, hunched over a computer in a dark room. In a way, we have...
Not all skills used by hackers and cybercriminals relate to computing. In fact, when coding gets a hacker nowhere, they turn to a classic technique used by scammers and con artists: social engineering....
Hackers wear many “hats.” There’s black hat hacking, but there’s also white hat, green hat, blue hat, red hat, and others. Some do it for the money. Others seek to cause havoc and...
Is your computer running slow? Do you see too many ads and pop-ups? If so, your Mac might be infected with WebHelper, one of those malicious apps that has given users worldwide nothing...
What do you get when you combine a browser hijacker with adware, spyware, and a program that can self-install and make changes to your computer? Wave Browser is what you get. While some...
Locky, the ransomware malware introduced in 2016, has infected millions of users worldwide, affecting Mac and Windows operating systems alike. While the original Locky is not active, some variants are still out there...