Cyber Safe Center

Cyber Safe Center

  • Home
  • Why CSCPage to describe the purpose of this website.
  • All PostsPage that contains all the posts.
  • AboutLinks to the About section.
  • ContactPage that allows a visitor to contact the Cyber Safe Center.
Subscribe

Phone

  • Stay safe on Android with Google Play Protect
    Newsletter

    Stay safe on Android with Google Play Protect

    Jul 27, 2025

    If you use an Android phone, keeping your applications and…

  • Secure sharing with Apple’s AirDrop
    Newsletter

    Secure sharing with Apple’s AirDrop

    Jun 22, 2025

    You may be using the Apple’s Airdrop feature to share…

  • Toll fee scam: What you can learn from it
    Newsletter

    Toll fee scam: What you can learn from it

    Jun 8, 2025

    I think everyone who has a cell phone has probably…

  • Carriers can’t stop scam texts on iPhones
    Newsletter

    Carriers can’t stop scam texts on iPhones

    May 26, 2025

    Android owners have a number of security issues on their…

  • SuperCard X scam on Android
    Newsletter

    SuperCard X scam on Android

    May 19, 2025

    Beware: a single tap of a credit card or bank…

  • Phone passcodes – is yours easy to guess?
    Newsletter

    Phone passcodes – is yours easy to guess?

    May 4, 2025

    I saw someone’s passcode was set to one of the…

  • “Hello” texts are not from your friends!
    Newsletter

    “Hello” texts are not from your friends!

    Apr 19, 2025

    One or two times each week I receive a text…

←Prev
1 2

Popular Posts

  • Subscription renewal scams

    Jan 11, 2026
  • New Year health scams

    Jan 11, 2026
  • Church Pastor Text Scam (this one is personal)

    Jan 6, 2026
  • “Perfect Voice” Scam

    Jan 6, 2026

Tags

Breach Devices Email Fake FBI Government Passwords Phone Privacy Scam

Cyber Safe Center

Cyber Safety Starts Here

A trusted resource for empowering people with guidance to stay safe and secure in today’s digital world.

Quick Links

  • Subscribe
  • Why Cyber Safe Starts HerePage to describe the purpose of this website.
  • All PostsList of the posts available on this site.
  • Personal Data Breaches
  • Glossary
  • Contact UsPage that allows a visitor to contact the Cyber Safe Center.
  • LegalLegal pages including Privacy Policy and Cookie Policy.
    • Opt-out preferences
    • Disclaimer
    • Imprint
    • Privacy Statement (US)
    • Privacy Statement (EU)
    • Cookie Policy (EU)

About

Cassie Crossley

Founder

Cassie is an experienced cybersecurity technology executive in Information Technology and Product Development and author of “Software Supply Chain Security: Securing the End-to-End Supply Chain for Software, Firmware, and Hardware.” She has many years of business and technical leadership experience in supply chain security, cybersecurity, product/application security, software/firmware development, program management, and data privacy. 

  • https://www.facebook.com/cassie.crossley0/
  • X
  • Instagram
  • LinkedIn

© 2025 Cyber Safe Center. All rights reserved.

Fresh Blog Lite Theme ⋅ Powered by WordPress

Manage your privacy
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}
Manage your privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}

Subscribe to stay CYBER SAFE

This weekly newsletter is your go-to source for the everyday person to stay informed and stay secure.

Invalid email address
We promise not to spam you. You can unsubscribe at any time.
Thanks for subscribing! Please look for the Welcome email (it might be your spam/junk/all mail folders).