How to prevent doxxing?

Unwittingly escalating an online argument is regrettably easy. One minute, you’re replying to an internet troll’s comment on Youtube. The next, you’ve been doxxed. If you’re lucky, you might get away with a few annoying messages or several hundred dollars worth of pizza delivered to your house. But if you’re unlucky, your life could become […]

Top 12 Ways to Keep Yourself Safe Online

There’s no way around it: the internet is an increasingly dangerous place. According to one study, the average internet-connected computer is attacked by hackers every 39 seconds. Yet most of us use the internet, whether for work or pleasure or both, for hours every single day. It’s important that you know the best ways to […]

How to Remove Your Address From the Internet: A Step-by-Step Guide

Family members, close friends, and the mailman might feature on a list of people you want to know your home address. Random internet strangers wouldn’t be on that list. There are very few good reasons why you might want to have your home address appear on the internet and a whole host of great ones […]

DeleteMe’s Best Practices for Minimizing Robocalls

“What’s the best way to stop robocalls?” “What’s the best way for minimizing robocalls?” At DeleteMe, we get these questions all the time. Well, truthfully, one of the best ways to reduce the number of spam calls and robocalls you receive is to use DeleteMe. Beyond using DeleteMe, there’s a number of different things that […]

How to Avoid Phishing Scams

With great convenience, and virtually fathomless access to information, entertainment, and ecommerce, comes great risks. That’s the trade-off that all of us make when we use the internet. It’s a significantly greater risk when we use the internet for email and any kind of ecommerce. Doing so opens us up to attempted hacks, identity thieving […]

DeleteMe’s Best Practices for Mobile Device Security

Until fairly recently, there was a disconnect between the way many users treated security of personal computers versus their portable devices.  PC’s receive antivirus applications, firewalls, layers of advanced network permissions, and many users have developed relatively sophisticated attitudes towards email-communications, encrypting sensitive attachments, and becoming more cognizant of phishing techniques. Mobile devices, on the […]