{"componentChunkName":"component---src-templates-blog-list-tsx","path":"/page/10","result":{"data":{"site":{"siteMetadata":{"title":"Browser Protection | Data & Privacy Security | Guardio Personal Blog","siteUrl":"https://guard.io","description":"Guardio's cybersecurity experts provide information to help protect you against identity theft, internet safety, hackers, spam & more."},"pathPrefix":"/blog"},"allContentfulBlogPost":{"edges":[{"node":{"title":"How to Protect Your Business with Web Filtering Software","slug":"how-to-protect-your-business-with-web-filtering-software","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/2c8V6awOmNaZXMEiNRN9NM/f1cc057690b1d9f7b12aad9093df5e95/Web_Filtering_Software_2-min.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/2c8V6awOmNaZXMEiNRN9NM/f1cc057690b1d9f7b12aad9093df5e95/Web_Filtering_Software_2-min.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/2c8V6awOmNaZXMEiNRN9NM/f1cc057690b1d9f7b12aad9093df5e95/Web_Filtering_Software_2-min.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/2c8V6awOmNaZXMEiNRN9NM/f1cc057690b1d9f7b12aad9093df5e95/Web_Filtering_Software_2-min.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/2c8V6awOmNaZXMEiNRN9NM/f1cc057690b1d9f7b12aad9093df5e95/Web_Filtering_Software_2-min.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/2c8V6awOmNaZXMEiNRN9NM/f1cc057690b1d9f7b12aad9093df5e95/Web_Filtering_Software_2-min.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/2c8V6awOmNaZXMEiNRN9NM/f1cc057690b1d9f7b12aad9093df5e95/Web_Filtering_Software_2-min.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/2c8V6awOmNaZXMEiNRN9NM/f1cc057690b1d9f7b12aad9093df5e95/Web_Filtering_Software_2-min.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/2c8V6awOmNaZXMEiNRN9NM/f1cc057690b1d9f7b12aad9093df5e95/Web_Filtering_Software_2-min.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#182838","width":440,"height":199.99999999999997}},"tags":["web filtering","web filtering software","cyber security"],"publishDate":"August 15th","body":{"childMarkdownRemark":{"timeToRead":3}},"description":{"childMarkdownRemark":{"excerpt":"In this blog post, Guardio discusses how web filtering software can help protect your business against cybercrime."}}}},{"node":{"title":"Don't Be a Victim This Christmas: How to Avoid the Most Common Scams","slug":"dont-be-a-victim-this-christmas-how-to-avoid-the-most-common-scams","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/5sfDe6nSjrl9mFhxPJhrk3/45eb5d559a1427e170c4a84441c851c5/Christmas_scam_1-min.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/5sfDe6nSjrl9mFhxPJhrk3/45eb5d559a1427e170c4a84441c851c5/Christmas_scam_1-min.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/5sfDe6nSjrl9mFhxPJhrk3/45eb5d559a1427e170c4a84441c851c5/Christmas_scam_1-min.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/5sfDe6nSjrl9mFhxPJhrk3/45eb5d559a1427e170c4a84441c851c5/Christmas_scam_1-min.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/5sfDe6nSjrl9mFhxPJhrk3/45eb5d559a1427e170c4a84441c851c5/Christmas_scam_1-min.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/5sfDe6nSjrl9mFhxPJhrk3/45eb5d559a1427e170c4a84441c851c5/Christmas_scam_1-min.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/5sfDe6nSjrl9mFhxPJhrk3/45eb5d559a1427e170c4a84441c851c5/Christmas_scam_1-min.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/5sfDe6nSjrl9mFhxPJhrk3/45eb5d559a1427e170c4a84441c851c5/Christmas_scam_1-min.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/5sfDe6nSjrl9mFhxPJhrk3/45eb5d559a1427e170c4a84441c851c5/Christmas_scam_1-min.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#181808","width":440,"height":199.99999999999997}},"tags":["Christmas","scams","Fraud","holidays scams","cyber security"],"publishDate":"August 14th","body":{"childMarkdownRemark":{"timeToRead":9}},"description":{"childMarkdownRemark":{"excerpt":"This blog post will discuss the most common Christmas scams and how to avoid them. We will also provide tips for safe online shopping this holiday season."}}}},{"node":{"title":"Email Scammers' Latest Tricks: How to Protect Yourself from Attack","slug":"email-scammers-latest-tricks-how-to-protect-yourself-from-attack","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/Ijfz9WVFBC0acBLF8QO7w/4c341352320825cc4e0e858b3fb232b8/Scammers-_Latest_Tricks_3-min.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/Ijfz9WVFBC0acBLF8QO7w/4c341352320825cc4e0e858b3fb232b8/Scammers-_Latest_Tricks_3-min.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/Ijfz9WVFBC0acBLF8QO7w/4c341352320825cc4e0e858b3fb232b8/Scammers-_Latest_Tricks_3-min.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/Ijfz9WVFBC0acBLF8QO7w/4c341352320825cc4e0e858b3fb232b8/Scammers-_Latest_Tricks_3-min.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/Ijfz9WVFBC0acBLF8QO7w/4c341352320825cc4e0e858b3fb232b8/Scammers-_Latest_Tricks_3-min.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/Ijfz9WVFBC0acBLF8QO7w/4c341352320825cc4e0e858b3fb232b8/Scammers-_Latest_Tricks_3-min.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/Ijfz9WVFBC0acBLF8QO7w/4c341352320825cc4e0e858b3fb232b8/Scammers-_Latest_Tricks_3-min.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/Ijfz9WVFBC0acBLF8QO7w/4c341352320825cc4e0e858b3fb232b8/Scammers-_Latest_Tricks_3-min.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/Ijfz9WVFBC0acBLF8QO7w/4c341352320825cc4e0e858b3fb232b8/Scammers-_Latest_Tricks_3-min.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#f8e8e8","width":440,"height":199.99999999999997}},"tags":["Email Scammers","Email Scams","email attacks","cyber security","scams"],"publishDate":"August 11th","body":{"childMarkdownRemark":{"timeToRead":7}},"description":{"childMarkdownRemark":{"excerpt":"Find out what email scammers are up to now, how their attacks work and the most common tricks they use. Stop the bad guys before they strike!"}}}},{"node":{"title":"What is a Data Leak? Stop Giving Cybercriminals Access","slug":"what-is-a-data-leak-stop-giving-cybercriminals-access","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6Gds2jKJZ1xBXSa6bFt179/344809005990041e1f14583fc7ebe394/Data_Leak_6-min.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6Gds2jKJZ1xBXSa6bFt179/344809005990041e1f14583fc7ebe394/Data_Leak_6-min.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6Gds2jKJZ1xBXSa6bFt179/344809005990041e1f14583fc7ebe394/Data_Leak_6-min.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6Gds2jKJZ1xBXSa6bFt179/344809005990041e1f14583fc7ebe394/Data_Leak_6-min.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/6Gds2jKJZ1xBXSa6bFt179/344809005990041e1f14583fc7ebe394/Data_Leak_6-min.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6Gds2jKJZ1xBXSa6bFt179/344809005990041e1f14583fc7ebe394/Data_Leak_6-min.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6Gds2jKJZ1xBXSa6bFt179/344809005990041e1f14583fc7ebe394/Data_Leak_6-min.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6Gds2jKJZ1xBXSa6bFt179/344809005990041e1f14583fc7ebe394/Data_Leak_6-min.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6Gds2jKJZ1xBXSa6bFt179/344809005990041e1f14583fc7ebe394/Data_Leak_6-min.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#080808","width":440,"height":199.99999999999997}},"tags":["Data Leak","cybercrime"],"publishDate":"August 7th","body":{"childMarkdownRemark":{"timeToRead":5}},"description":{"childMarkdownRemark":{"excerpt":"A data leak can be a huge problem for businesses. Find out what they are, how to prevent them, and what to do if your business suffers a data leak."}}}},{"node":{"title":"Malware on browser","slug":"malware-on-browser","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/1BzzJa8VqW7jmHJrHNdY1d/669e8248b773a4094e4e86af0fb5a202/Data_Leak_4-min.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/1BzzJa8VqW7jmHJrHNdY1d/669e8248b773a4094e4e86af0fb5a202/Data_Leak_4-min.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/1BzzJa8VqW7jmHJrHNdY1d/669e8248b773a4094e4e86af0fb5a202/Data_Leak_4-min.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/1BzzJa8VqW7jmHJrHNdY1d/669e8248b773a4094e4e86af0fb5a202/Data_Leak_4-min.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/1BzzJa8VqW7jmHJrHNdY1d/669e8248b773a4094e4e86af0fb5a202/Data_Leak_4-min.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/1BzzJa8VqW7jmHJrHNdY1d/669e8248b773a4094e4e86af0fb5a202/Data_Leak_4-min.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/1BzzJa8VqW7jmHJrHNdY1d/669e8248b773a4094e4e86af0fb5a202/Data_Leak_4-min.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/1BzzJa8VqW7jmHJrHNdY1d/669e8248b773a4094e4e86af0fb5a202/Data_Leak_4-min.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/1BzzJa8VqW7jmHJrHNdY1d/669e8248b773a4094e4e86af0fb5a202/Data_Leak_4-min.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#d8e8f8","width":440,"height":199.99999999999997}},"tags":["Malware ","Browser","browser protection ","cyber security","Online Security"],"publishDate":"August 7th","body":{"childMarkdownRemark":{"timeToRead":3}},"description":{"childMarkdownRemark":{"excerpt":"What is malware? How does it get onto your computer, and how can you prevent it from happening in the future. We look at these questions and how to fix an infected computer."}}}},{"node":{"title":"Microsoft Rolls Out Azure AD Security Defaults to Protect Millions of Organizations from Password and Phishing Attacks","slug":"microsoft-rolls-out-azure-ad-security-defaults-to-protect-millions-of","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/56skZMpo4fLMnLy3fQ8X2e/b23d8a14760f294a983d3bbc463f621b/Azure_AD_1-min.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/56skZMpo4fLMnLy3fQ8X2e/b23d8a14760f294a983d3bbc463f621b/Azure_AD_1-min.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/56skZMpo4fLMnLy3fQ8X2e/b23d8a14760f294a983d3bbc463f621b/Azure_AD_1-min.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/56skZMpo4fLMnLy3fQ8X2e/b23d8a14760f294a983d3bbc463f621b/Azure_AD_1-min.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/56skZMpo4fLMnLy3fQ8X2e/b23d8a14760f294a983d3bbc463f621b/Azure_AD_1-min.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/56skZMpo4fLMnLy3fQ8X2e/b23d8a14760f294a983d3bbc463f621b/Azure_AD_1-min.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/56skZMpo4fLMnLy3fQ8X2e/b23d8a14760f294a983d3bbc463f621b/Azure_AD_1-min.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/56skZMpo4fLMnLy3fQ8X2e/b23d8a14760f294a983d3bbc463f621b/Azure_AD_1-min.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/56skZMpo4fLMnLy3fQ8X2e/b23d8a14760f294a983d3bbc463f621b/Azure_AD_1-min.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#e8e8e8","width":440,"height":199.99999999999997}},"tags":["Microsoft ","Password ","Phishing ","cyber security"],"publishDate":"August 5th","body":{"childMarkdownRemark":{"timeToRead":3}},"description":{"childMarkdownRemark":{"excerpt":"Microsoft is implementing security defaults for a huge number of Azure Active Directory (AD) accounts in order to combat password and phishing attacks."}}}},{"node":{"title":"Amazon Warns Customers About Scammers ","slug":"amazon-warns-customers-about-scammers-or-guardio","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6rcl5Sd1FpJufMkKagnH8v/0f7c78a45259c385a921282228523948/Amazon_Warns_Customers-min.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6rcl5Sd1FpJufMkKagnH8v/0f7c78a45259c385a921282228523948/Amazon_Warns_Customers-min.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6rcl5Sd1FpJufMkKagnH8v/0f7c78a45259c385a921282228523948/Amazon_Warns_Customers-min.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6rcl5Sd1FpJufMkKagnH8v/0f7c78a45259c385a921282228523948/Amazon_Warns_Customers-min.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/6rcl5Sd1FpJufMkKagnH8v/0f7c78a45259c385a921282228523948/Amazon_Warns_Customers-min.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6rcl5Sd1FpJufMkKagnH8v/0f7c78a45259c385a921282228523948/Amazon_Warns_Customers-min.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6rcl5Sd1FpJufMkKagnH8v/0f7c78a45259c385a921282228523948/Amazon_Warns_Customers-min.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6rcl5Sd1FpJufMkKagnH8v/0f7c78a45259c385a921282228523948/Amazon_Warns_Customers-min.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6rcl5Sd1FpJufMkKagnH8v/0f7c78a45259c385a921282228523948/Amazon_Warns_Customers-min.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#b8c8d8","width":440,"height":199.99999999999997}},"tags":["amazon","scams"],"publishDate":"August 4th","body":{"childMarkdownRemark":{"timeToRead":2}},"description":{"childMarkdownRemark":{"excerpt":"Amazon is warning customers about scammers attempting to impersonate the company. Here are some tips you can use to avoid scams today!"}}}},{"node":{"title":"DuckDuckGo Exposed: Key Privacy Concerns Uncovered","slug":"duckduckgo-the-internet-privacy-company-fails-to-keep-its-promise","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6xn6V67IJAnRH39hturlot/0d7b7597f9ee5976ee52ba5e1c668e2c/DuckDuckGo_1-min.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6xn6V67IJAnRH39hturlot/0d7b7597f9ee5976ee52ba5e1c668e2c/DuckDuckGo_1-min.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6xn6V67IJAnRH39hturlot/0d7b7597f9ee5976ee52ba5e1c668e2c/DuckDuckGo_1-min.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6xn6V67IJAnRH39hturlot/0d7b7597f9ee5976ee52ba5e1c668e2c/DuckDuckGo_1-min.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/6xn6V67IJAnRH39hturlot/0d7b7597f9ee5976ee52ba5e1c668e2c/DuckDuckGo_1-min.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6xn6V67IJAnRH39hturlot/0d7b7597f9ee5976ee52ba5e1c668e2c/DuckDuckGo_1-min.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6xn6V67IJAnRH39hturlot/0d7b7597f9ee5976ee52ba5e1c668e2c/DuckDuckGo_1-min.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6xn6V67IJAnRH39hturlot/0d7b7597f9ee5976ee52ba5e1c668e2c/DuckDuckGo_1-min.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6xn6V67IJAnRH39hturlot/0d7b7597f9ee5976ee52ba5e1c668e2c/DuckDuckGo_1-min.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#e8e8e8","width":440,"height":199.99999999999997}},"tags":["DuckDuckGo","cyber security","Online Security"],"publishDate":"August 3rd","body":{"childMarkdownRemark":{"timeToRead":6}},"description":{"childMarkdownRemark":{"excerpt":"What's worse than a search engine that doesn't respect your privacy? One that you can't trust. Find out what happened with DuckDuckGo and Microsoft."}}}},{"node":{"title":"Tech Support Scammers caught on CCTV Cameras","slug":"tech-support-scammers-caught-on-cctv-cameras","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/EMBvfuoX0LTuGNrLrw1BM/84b33dc65413740443d1ba0242258ef6/CCTV_8-min.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/EMBvfuoX0LTuGNrLrw1BM/84b33dc65413740443d1ba0242258ef6/CCTV_8-min.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/EMBvfuoX0LTuGNrLrw1BM/84b33dc65413740443d1ba0242258ef6/CCTV_8-min.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/EMBvfuoX0LTuGNrLrw1BM/84b33dc65413740443d1ba0242258ef6/CCTV_8-min.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/EMBvfuoX0LTuGNrLrw1BM/84b33dc65413740443d1ba0242258ef6/CCTV_8-min.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/EMBvfuoX0LTuGNrLrw1BM/84b33dc65413740443d1ba0242258ef6/CCTV_8-min.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/EMBvfuoX0LTuGNrLrw1BM/84b33dc65413740443d1ba0242258ef6/CCTV_8-min.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/EMBvfuoX0LTuGNrLrw1BM/84b33dc65413740443d1ba0242258ef6/CCTV_8-min.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/EMBvfuoX0LTuGNrLrw1BM/84b33dc65413740443d1ba0242258ef6/CCTV_8-min.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#181818","width":440,"height":199.99999999999997}},"tags":["Tech Support Scammers","scambaiter","scams"],"publishDate":"July 28th","body":{"childMarkdownRemark":{"timeToRead":3}},"description":{"childMarkdownRemark":{"excerpt":"YouTuber took down a tech support scam ring by hacking into their CCTV cameras and notifying the police."}}}},{"node":{"title":"How to avoid Phishing Scams on Facebook ","slug":"how-to-avoid-phishing-scams-on-facebook","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/1AqCyEG7mFiwK4nXhCKiig/93dfdc0d90113eba4e9e27d829151581/Facebook_phishing_scams_2-min.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/1AqCyEG7mFiwK4nXhCKiig/93dfdc0d90113eba4e9e27d829151581/Facebook_phishing_scams_2-min.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/1AqCyEG7mFiwK4nXhCKiig/93dfdc0d90113eba4e9e27d829151581/Facebook_phishing_scams_2-min.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/1AqCyEG7mFiwK4nXhCKiig/93dfdc0d90113eba4e9e27d829151581/Facebook_phishing_scams_2-min.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/1AqCyEG7mFiwK4nXhCKiig/93dfdc0d90113eba4e9e27d829151581/Facebook_phishing_scams_2-min.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/1AqCyEG7mFiwK4nXhCKiig/93dfdc0d90113eba4e9e27d829151581/Facebook_phishing_scams_2-min.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/1AqCyEG7mFiwK4nXhCKiig/93dfdc0d90113eba4e9e27d829151581/Facebook_phishing_scams_2-min.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/1AqCyEG7mFiwK4nXhCKiig/93dfdc0d90113eba4e9e27d829151581/Facebook_phishing_scams_2-min.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/1AqCyEG7mFiwK4nXhCKiig/93dfdc0d90113eba4e9e27d829151581/Facebook_phishing_scams_2-min.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#2828b8","width":440,"height":199.99999999999997}},"tags":["Phishing Scams","Facebook","scams","online security"],"publishDate":"July 28th","body":{"childMarkdownRemark":{"timeToRead":3}},"description":{"childMarkdownRemark":{"excerpt":"How to recognize phishing scams and what you can do if you think your personal information has been compromised."}}}},{"node":{"title":"How Scam Sites look","slug":"how-scam-sites-look","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6dxk18zB4OTCxPsPPeH7rk/c0578f662463b2cea7d57ed1a2800d5a/How_Scam_Sites_look_2-min.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6dxk18zB4OTCxPsPPeH7rk/c0578f662463b2cea7d57ed1a2800d5a/How_Scam_Sites_look_2-min.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6dxk18zB4OTCxPsPPeH7rk/c0578f662463b2cea7d57ed1a2800d5a/How_Scam_Sites_look_2-min.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6dxk18zB4OTCxPsPPeH7rk/c0578f662463b2cea7d57ed1a2800d5a/How_Scam_Sites_look_2-min.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/6dxk18zB4OTCxPsPPeH7rk/c0578f662463b2cea7d57ed1a2800d5a/How_Scam_Sites_look_2-min.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/6dxk18zB4OTCxPsPPeH7rk/c0578f662463b2cea7d57ed1a2800d5a/How_Scam_Sites_look_2-min.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/6dxk18zB4OTCxPsPPeH7rk/c0578f662463b2cea7d57ed1a2800d5a/How_Scam_Sites_look_2-min.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/6dxk18zB4OTCxPsPPeH7rk/c0578f662463b2cea7d57ed1a2800d5a/How_Scam_Sites_look_2-min.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/6dxk18zB4OTCxPsPPeH7rk/c0578f662463b2cea7d57ed1a2800d5a/How_Scam_Sites_look_2-min.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#587888","width":440,"height":199.99999999999997}},"tags":["Scam Sites","sca,s","online security","browser protection"],"publishDate":"July 28th","body":{"childMarkdownRemark":{"timeToRead":5}},"description":{"childMarkdownRemark":{"excerpt":"Learn how to spot a scam website before you become a victim. Find out the telltale signs of a fraudulent site and protect yourself and your loved ones online."}}}},{"node":{"title":"Browser Safety - why it is important","slug":"browser-safety-why-it-is-important","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/4xCDesnZbW8CmQQZCItzAb/e841fd8d7e1d4abbcb1e96e724cdbd09/Browser_Safety_1-min.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/4xCDesnZbW8CmQQZCItzAb/e841fd8d7e1d4abbcb1e96e724cdbd09/Browser_Safety_1-min.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/4xCDesnZbW8CmQQZCItzAb/e841fd8d7e1d4abbcb1e96e724cdbd09/Browser_Safety_1-min.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/4xCDesnZbW8CmQQZCItzAb/e841fd8d7e1d4abbcb1e96e724cdbd09/Browser_Safety_1-min.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/4xCDesnZbW8CmQQZCItzAb/e841fd8d7e1d4abbcb1e96e724cdbd09/Browser_Safety_1-min.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/4xCDesnZbW8CmQQZCItzAb/e841fd8d7e1d4abbcb1e96e724cdbd09/Browser_Safety_1-min.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/4xCDesnZbW8CmQQZCItzAb/e841fd8d7e1d4abbcb1e96e724cdbd09/Browser_Safety_1-min.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/4xCDesnZbW8CmQQZCItzAb/e841fd8d7e1d4abbcb1e96e724cdbd09/Browser_Safety_1-min.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/4xCDesnZbW8CmQQZCItzAb/e841fd8d7e1d4abbcb1e96e724cdbd09/Browser_Safety_1-min.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#a8b8c8","width":440,"height":199.99999999999997}},"tags":["Browser Security"],"publishDate":"July 28th","body":{"childMarkdownRemark":{"timeToRead":3}},"description":{"childMarkdownRemark":{"excerpt":"Learn about the dangers of not using a secure browser and how to make sure you are protected."}}}},{"node":{"title":"What is Remote Access Trojan (RAT)","slug":"what-is-remote-access-trojan-rat","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/5NtZVwEy5jdZr8Y56cjUm/6a093d42a416e250067514cc837445a6/RATs_1-min.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/5NtZVwEy5jdZr8Y56cjUm/6a093d42a416e250067514cc837445a6/RATs_1-min.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/5NtZVwEy5jdZr8Y56cjUm/6a093d42a416e250067514cc837445a6/RATs_1-min.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/5NtZVwEy5jdZr8Y56cjUm/6a093d42a416e250067514cc837445a6/RATs_1-min.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/5NtZVwEy5jdZr8Y56cjUm/6a093d42a416e250067514cc837445a6/RATs_1-min.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/5NtZVwEy5jdZr8Y56cjUm/6a093d42a416e250067514cc837445a6/RATs_1-min.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/5NtZVwEy5jdZr8Y56cjUm/6a093d42a416e250067514cc837445a6/RATs_1-min.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/5NtZVwEy5jdZr8Y56cjUm/6a093d42a416e250067514cc837445a6/RATs_1-min.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/5NtZVwEy5jdZr8Y56cjUm/6a093d42a416e250067514cc837445a6/RATs_1-min.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#080808","width":440,"height":199.99999999999997}},"tags":["Remote Access Trojan","rat","trojam","cyber security"],"publishDate":"July 21st","body":{"childMarkdownRemark":{"timeToRead":3}},"description":{"childMarkdownRemark":{"excerpt":"Learn how scammers can use caller ID spoofing to their advantage and find out ways you can protect yourself from these scams."}}}},{"node":{"title":"Introduction To Caller ID Spoofing And How It's Used In Scams","slug":"introduction-to-caller-id-spoofing-and-how-its-used-in-scams","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/3VFa1GvNCHlX3b23um3zce/d5a153400fea5a7e6fee5b9e2b677706/Caller_ID_Spoofing_2-min.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/3VFa1GvNCHlX3b23um3zce/d5a153400fea5a7e6fee5b9e2b677706/Caller_ID_Spoofing_2-min.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/3VFa1GvNCHlX3b23um3zce/d5a153400fea5a7e6fee5b9e2b677706/Caller_ID_Spoofing_2-min.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/3VFa1GvNCHlX3b23um3zce/d5a153400fea5a7e6fee5b9e2b677706/Caller_ID_Spoofing_2-min.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/3VFa1GvNCHlX3b23um3zce/d5a153400fea5a7e6fee5b9e2b677706/Caller_ID_Spoofing_2-min.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/3VFa1GvNCHlX3b23um3zce/d5a153400fea5a7e6fee5b9e2b677706/Caller_ID_Spoofing_2-min.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/3VFa1GvNCHlX3b23um3zce/d5a153400fea5a7e6fee5b9e2b677706/Caller_ID_Spoofing_2-min.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/3VFa1GvNCHlX3b23um3zce/d5a153400fea5a7e6fee5b9e2b677706/Caller_ID_Spoofing_2-min.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/3VFa1GvNCHlX3b23um3zce/d5a153400fea5a7e6fee5b9e2b677706/Caller_ID_Spoofing_2-min.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#080808","width":440,"height":199.99999999999997}},"tags":["cyber security","online protection","scams","Data Leak"],"publishDate":"July 21st","body":{"childMarkdownRemark":{"timeToRead":5}},"description":{"childMarkdownRemark":{"excerpt":"Learn how scammers can use caller ID spoofing to their advantage and find out ways you can protect yourself from these scams."}}}}]}},"pageContext":{"limit":14,"skip":126,"numPages":28,"currentPage":10,"breadcrumb":{"location":"/page/10","crumbs":[{"pathname":"/","crumbLabel":"Blog"},{"pathname":"/page","crumbLabel":"page"},{"pathname":"/page/10","crumbLabel":"10"}]}}},"staticQueryHashes":["1614255152"]}