Cyber Safe Center

Cyber Safe Center

  • Home
  • Why CSCPage to describe the purpose of this website.
  • All PostsPage that contains all the posts.
  • AboutLinks to the About section.
  • ContactPage that allows a visitor to contact the Cyber Safe Center.
Subscribe

Devices

  • Secure sharing with Apple’s AirDrop
    Newsletter

    Secure sharing with Apple’s AirDrop

    Jun 22, 2025

    You may be using the Apple’s Airdrop feature to share…

  • FBI warning: BADBOX 2.0 botnet on your IoT home devices
    Newsletter

    FBI warning: BADBOX 2.0 botnet on your IoT home devices

    Jun 8, 2025

    Do you want to help criminals? No, I didn’t think…

  • Ad tracking through ultrasonic eavesdropping
    Newsletter

    Ad tracking through ultrasonic eavesdropping

    May 26, 2025

    “Papa, can you hear me?” sang Barbra Streisand in the…

  • FBI alert for home internet routers
    Newsletter

    FBI alert for home internet routers

    May 11, 2025

    First let me explain that a router connects to other…

Popular Posts

  • Secure sharing with Apple’s AirDrop

    Jun 22, 2025
  • 184 million passwords data breach

    Jun 16, 2025
  • Ad scams on Facebook and Instagram

    Jun 15, 2025
  • FBI warning: BADBOX 2.0 botnet on your IoT home devices

    Jun 8, 2025

Tags

Devices Email Fake FBI Government Passwords Phone Scam Spam Spy

Cyber Safe Center

Cyber Safety Starts Here

A trusted resource for empowering people with guidance to stay safe and secure in today’s digital world.

Quick Links

  • Subscribe
  • Why Cyber Safe Starts HerePage to describe the purpose of this website.
  • All PostsList of the posts available on this site.
  • Contact UsPage that allows a visitor to contact the Cyber Safe Center.
  • LegalLegal pages including Privacy Policy and Cookie Policy.
    • Opt-out preferences
    • Disclaimer
    • Imprint
    • Privacy Statement (US)
    • Privacy Statement (EU)
    • Cookie Policy (EU)

About

Cassie Crossley

Founder

Cassie is an experienced cybersecurity technology executive in Information Technology and Product Development and author of “Software Supply Chain Security: Securing the End-to-End Supply Chain for Software, Firmware, and Hardware.” She has many years of business and technical leadership experience in supply chain security, cybersecurity, product/application security, software/firmware development, program management, and data privacy. 

  • https://www.facebook.com/cassie.crossley0/
  • X
  • Instagram
  • LinkedIn

© 2025 Cyber Safe Center. All rights reserved.

Fresh Blog Lite Theme ⋅ Powered by WordPress

Manage your privacy

To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.

Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Statistics

Marketing

Features
Always active

Always active
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Manage options
{title} {title} {title}
Manage your privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Statistics

Marketing

Features
Always active

Always active
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Manage options
{title} {title} {title}

Subscribe to stay CYBER SAFE

This weekly newsletter is your go-to source for the everyday person to stay informed and stay secure.

Invalid email address
We promise not to spam you. You can unsubscribe at any time.
Thanks for subscribing! Please look for the Welcome email (it might be your spam/junk/all mail folders).