Articles by Ben Martens

Ben Martens

Ben Martens is a cybersecurity journalist with a background in internet ethics, malware testing, and public policy. He resides in Oregon, and when he's not advocating for the rights of internet users, he's walking with his dog and inventing stories with his daughter.

What Is a Zero-Day Threat & How to Stay Protected Against It in 2021?
What Is a Zero-Day Threat & How to Stay Protected Against It in 2021?
Zero-day exploits take advantage of a software vulnerability that the software’s developer hasn’t patched. Zero-day exploits aren’t malware, but hackers use zero-days to install malware on user devices without alerting a user’s bu...
Ben Martens by Ben Martens July 2, 2021
Do You Need an Antivirus for Chromebook in 2021? Actually, Yes.
Do You Need an Antivirus for Chromebook in 2021? Actually, Yes.
Short on time? Here’s the best antivirus for Chromebook: 🥇Norton Mobile Security: Powerful anti-malware protection, advanced Wi-Fi security, VPN with unlimited data, and more. Norton doesn’t officially “support” Chrome OS, but i...
Ben Martens by Ben Martens July 2, 2021
What Is Fleeceware & How to Prevent Fleeceware Scams in 2021
What Is Fleeceware & How to Prevent Fleeceware Scams in 2021
Fleeceware is a term for mobile apps that overcharge users for basic functionality. Unlike apps that are designed to steal personal information or infect devices with malware, fleeceware works as promised, doesn’t contain maliciou...
Ben Martens by Ben Martens June 30, 2021
Best Free Antivirus Software for Mac (2021) — Are Any of Them Good?
Best Free Antivirus Software for Mac (2021) — Are Any of Them Good?
Short on time? Here’s the best free Mac antivirus of 2021: If you really need a free Mac antivirus, Avira is the best. Avira provides excellent real-time malware protection, anti-phishing and malicious website filtering, system...
Ben Martens by Ben Martens June 16, 2021
How to Keep Kids Safe on YouTube (Restrict Unsafe Videos) in 2021
How to Keep Kids Safe on YouTube (Restrict Unsafe Videos) in 2021
Keeping kids away from inappropriate YouTube content can feel overwhelming. There are several billion YouTube videos (500+ hours of video are uploaded every minute), and 2 billion users log into YouTube every month — so how do we...
Ben Martens by Ben Martens June 2, 2021
What Is a Backdoor & How to Prevent Backdoor Virus Attacks in 2021
What Is a Backdoor & How to Prevent Backdoor Virus Attacks in 2021
A backdoor is any method that allows somebody — hackers, governments, IT people, etc. — to remotely access your device without your permission or knowledge. Hackers can install a backdoor onto your device by using malware, by expl...
Ben Martens by Ben Martens May 31, 2021
What Are Antivirus False Positives & How to Fix Them in 2021?
What Are Antivirus False Positives & How to Fix Them in 2021?
When an antivirus scanner labels a legitimate file as a malware file, this is called a “false positive”. Firewalls and anti-phishing protections can also detect false positives at the network and browser level, respectively. As an...
Ben Martens by Ben Martens May 27, 2021
What Is Spoofing & How to Prevent Spoofing Attacks in 2021?
What Is Spoofing & How to Prevent Spoofing Attacks in 2021?
Spoofing is the act of faking a virtual identity for hacking or security purposes. The most common types of spoofing include faking things like websites, caller ID, and email sender information, but there are also technically adva...
Ben Martens by Ben Martens May 25, 2021
What Is a Rootkit & How to Prevent a Rootkit Infection in 2021?
What Is a Rootkit & How to Prevent a Rootkit Infection in 2021?
Rootkits are dangerous malware files that embed themselves deep into operating systems, applications, firmware, and bootloaders, making fundamental changes to user devices while being able to hide from traditional malware scanning...
Ben Martens by Ben Martens May 25, 2021
What Is a Man-in-the-Middle Attack & How to Prevent One in 2021?
What Is a Man-in-the-Middle Attack & How to Prevent One in 2021?
A man-in-the-middle (MITM) attack is a type of cyberattack where a third party secretly places themselves in the middle of a data transfer or conversation between two parties. For example, MITM attacks often target banking website...
Ben Martens by Ben Martens May 19, 2021