We talk a lot about the differences between digital natives and older generations, who came of age way before the internet. That’s because it really can’t be overemphasized: Growing up with access to so much knowledge and so many forms of comm…
Nearly everyone is concerned about their security and privacy, both online and offline. Ever since personal computing became a thing, people have become increasingly better at using PCs to be more productive, better informed, or entertained.&n…
Just as you wouldn’t put your kid in a car at age 16 and say, “Drive, kid!” without ever talking to them about how to drive — and why speeding or driving intoxicated or looking at your phone while driving is dangerous — you can’t let a kid run…
Perhaps more than anything else, the contemporary internet is a Place for Opinions. We’ve even come up with entirely new terminologies for the different ways you can argue online. Flame wars. Sealioning. Reply guys. And, of course, trolling.
The initial phases of a breach are often the most critical: The intruder is counting on your confusion, your lack of a plan or a clear chain of authority, and any early missteps. Given that it’s only a matter of time before a breach happens, w…
Life online can be tricky. We have access to basically all the information in the world, right in our pockets. But while that’s arguably the most incredible thing that’s ever happened to humanity, it’s also really overwhelming! Studies have sh…
Tech abuse involves much more than sharing passwords. It can be anything from unwanted messages, spyware or stalkerware being installed on devices, to controlling or harassing someone via home tech.
Over the past few years, classrooms have moved to kitchens and bedrooms and playgrounds have been replaced by online video games. The methods for making friends have forever been altered. Internet friendships are often more common than real-wo…
We’ve covered the dangers and necessary defenses against various scams, including romance scams, supply chain scams, financial scams, lottery scams, and vishing scams, but now we turn our attention to what could be the most personal and invasi…
When people hear the word “hacker,” they probably picture a man sitting alone in a dark room in front of a computer. He has a black screen with green computer code in front of him. Maybe he’s wearing a hoodie with the hood pulled up. (He’s def…