Did you know that your eReader can be hacked? Just like any web-connected device, eReaders like Amazon’s Kindle are still susceptible to cyber attacks. Hackers most often attack endpoints – computers, smartphones or tablets – to later gain entry into the target network. That’s why it’s important you only download books from verified sources, like […]
Apple’s AirTag is a button-sized device that can be attached to things to keep track of them. They use Bluetooth and Near-field communication (NFC) to anonymously communicate with a nearby iPhone through Apple’s “Find My” feature. In doing so, they can be used to actively monitor the device’s real-time location. Although equipped with security safeguards, […]
When you have friends, family or other guests to your home, chances are some of them may want access to your Wi-Fi. Instead of typing in a long password that the other person might see, you can use the Wi-Fi sharing feature in iOS 11 or higher that allows you to grant access to others […]
The Messages app on any iPhone or Mac collects both your SMS texts and iMessage chats. For the latter, you can configure a setting that restricts notifications for any iMessage from a phone number or email address that’s not already in your contacts list. This can be used to help filter out message spam and […]
Outdated applications and Operating Systems (OS) are a breeding ground for malware since they often have known vulnerabilities that can only be fixed by upgrading. If you see a new version is available, install it right away. Many platforms, such as Apple iOS, even allow you to automatically schedule security updates so you don’t miss […]
End-to-end encryption helps you protect your messages and conversations from being monitored and reviewed by unauthorized parties. Apple’s iMessage chat provides end-to-end encryption between iMessage users, and there are a variety of third-party messaging apps that can exchange encrypted over-the-top (OTT) messages between users on the same app. Popular options include WhatsApp and Signal, and […]
Privacy /
Legal
Do Not Sell My Information
Copyright ©2022 Total Defense Inc. All Rights Reserved.
At Total Defense we take your privacy seriously. We recently made updates to our privacy policy to comply with the European Union’s General Data Privacy Regulation. This policy explains:
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.