Loraine Balita-Centeno

Writer | Editor | Communications Specialist | Social Media Manager

Why That Email About Your Apple ID Being Locked Is a Scam

Since macOS and iOS are still more secure and impenetrable compared to other systems, cybercriminals resort to phishing tactics to hack into Apple accounts. They use social engineering to trick users into giving their Apple ID and password. So yes, that "Apple ID locked" email is fake. Here’s what you need to know about Apple scams and how you can spot one. Scammers who are out to steal your Apple information will use social engineering through phone calls, SMS, or even calendar invitations. B

3 Airbnb Scams You Need to Know About Before Booking Your Trip

Airbnb has long been criticized for its loose policies and even looser enforcement. Its rules are filled with loopholes that scammers have wriggled their way into. Things have gotten so bad that the internet is now filled with horror stories from vacationers who had a bad experience on the platform. Here are some of the most common Airbnb scams you should know about before booking somewhere for your next vacation, and tips for protecting yourself. The most common scammers you might encounter

What Are TikTok Gifts, Diamonds, and Coins?

Besides providing endless hours of entertainment and a platform to share dance moves, TikTok allows content creators to make money through virtual gifts. Creators can join the TikTok Live Stream Program so they can live stream and earn gifts from their followers. Here's all you need to know about coins, gifts, and diamonds on TikTok. What to Know About the TikTok Live Stream Program The TikTok Live Stream Program isn't open to everyone. The program is only open to users who are aged 16 or o

What You Need To Know About Swatting

Imagine opening your door to see a swarm of heavily armed SWAT officers pointing their guns at you. You don’t know what’s happening. You have no idea why they’re raiding your home and kicking doors open. If this happens to you, you’ve become a victim of swatting. This means that someone placed a hoax 911 call to send authorities to your house. Many celebrities have become victims to this insidious “prank” and while it might seem like a joke for some, it can become extremely dangerous, even dead

What Is a Remote Access Trojan?

RATS or Remote Access Trojans have gone a long way from the prank tool 90s kids used to spook their friends. From simply opening CD trays and controlling computers remotely to scare their victims, it has evolved into some of the most prevalent malware in the wild. Here’s everything you need to know about this Trojan and what you can do about a RAT infestation. A RAT is a Trojan, a type of malware disguised as something else that victims need—like a legitimate file, program, or app. It tricks

What You Need To Know About Golang-Based Malware

Golang is becoming the programming language of choice for many malware developers. According to cybersecurity firm Intezer, there’s been an almost 2000 percent increase in the number of Go-based malware strains found in the wild since 2017. The number of attacks using this type of malware is expected to increase in the next couple of years. What’s most alarming is that we’re seeing many threat actors who are targeting multiple operating systems with strains from a single Go codebase.

Were You Affected By the DoorDash Data Breach?

The demand for food delivery services like DoorDash has skyrocketed in the wake of the Coronavirus pandemic. Since we give these apps a treasure trove of personal and banking information, you need to ask yourself, is my information safe? A massive DoorDash data breach by a third party was discovered in May 2019. A slew of personal information and financial details were compromised during the leak putting many at risk of a cyberattack. So how do you find out if you were affected by the DoorDash

Everything You Need to Know About NetWalker Ransomware

Netwalker is a strain of ransomware that targets Windows-based systems. First discovered in August 2019, it evolved throughout the rest of 2019 and into 2020. Significant spikes in NetWalker targeted attacks were noted by the FBI during the height of the Covid-19 pandemic. Here's what you need to know about the ransomware that has attacked major schools, healthcare systems, and government institutions throughout the US and Europe.

10 Most-Visited Canadian Cities

Canada is a beautiful country replete with majestic wonders of nature and brimming with opportunities to connect with wildlife. But aside from its famous nature spots Canada is also home to many modern metropoles that have welcomed people of diverse cultures from all over the world. Cities like Toronto and Vancouver are melting pots of various cultures where people of different backgrounds share their cuisine, language, music, and arts. From the glistening lakes of Banff to the skyscrapers in downtown Toronto...

7 Unmistakable Signs You’ve Become an Internet Troll

It’s easy to spot one of the internet's most annoying by-products—the trolls. They have a penchant for fighting online. They like shoving their opinion where it doesn’t belong because they believe they’re always right. And they like engaging in pointless arguments. But if you spend a lot of time among trolls, you may find yourself picking up a few of their habits. So if you’re wondering why people seem to hate you just because of a "passionate exchange of ideas" you’ve had online, maybe it’s time to check if you’re becoming a troll yourself. Here are a few signs that you’re turning into an internet troll...

What is Pharming and How Do You Protect Yourself From It?

Pharming is a type of cyber attack that involves redirecting web traffic from a legitimate site to a bogus site. The latter is designed to look like the legitimate site so users will be duped into logging in and typing their details. These details are then harvested by "pharmers" and used for illegal activities. Like phishing, pharming is meant to collect user information like username and passwords or bank details. Although compared to phishing, pharming is much more sophisticated and sinister.

What We Can Learn From Ruth Bader Ginsburg About Raising Daughters

The world is still reeling from the loss of a feminist icon, a quiet lady who packed a giant fight inside her small frame. Ruth Bader Ginsburg, fondly called Notorious RBG in popular culture, has finally succumbed to cancer, now the Internet is teeming with tributes from people—many of them women and mothers—who were inspired by RBG. She lived a life of purpose and spent decades as a staunch supporter of and a fighter for women’s rights. She championed the rights of working mothers, pushed to change biased laws, sought to protect women workers, and ultimately paved the way for women who want to have a career despite societal limitations. She embarked on a long and arduous campaign against pregnancy discrimination and fought to give women (especially mothers) equal access to career opportunities by crushing societal limitations in the legal arena.

Millennial Moms Still Carry A Bigger Burden Than Dads

It’s been more than 40 years since women demanding equal treatment marched the streets during the feminist movement of the 60s and 70s. One hundred years have passed since the technological revolution of the 20s freed women of the drudgery of housework and allowed them to join the workforce. Much seems to have changed—more women are occupying jobs previously held exclusively by men, more mothers are now pursuing advanced education, many are running organizations and institutions, but so much still needs to be done to break through the proverbial glass ceiling.

What Are Cyberwarfare, Cyberterrorism, and Cyberespionage?

It’s easy to brush these things off as just the stuff of Hollywood movies. But cyber threats like cyberterrorism, cyberwarfare, and large-scale cyber espionage exist IRL too. While most cybercrimes are performed with financial gain as the goal, cyberwarfare, cyberterrorism, and cyber espionage when used for the first two can have much more damage. The latter can include thousands of lives lost, injury to people, and disruption of society’s ability to maintain order.
Load More Articles
Close