Mary James
Mary is a cybersecurity writer based in Los Angeles, holding a B.S. in Liberal Arts from Clarion University and an M.F.A. in Creative Writing from Point Park University in Pittsburgh. With over seven years of experience, she focuses on educating the public on a wide range of cybersecurity topics, from VPNs to antivirus software.
Mary’s previous experience in sales and content creation at a private cybersecurity firm has enabled her to translate complex topics into easily digestible concepts. Her work has been featured in national publications such as MSN, CNBC, and PC Matic's private blog, reflecting her dedication to sharing vital cybersecurity insights and empowering the public to safeguard their private data.
When she's not writing, Mary works at her local theatre while also enjoying the trifecta of the beach, mountains, and desert.
- MSN
- CNBC
- PC Matic
- Antivirus
- VPNs
- Identity Theft
- B.S. in Liberal Arts from Clarion University
- M.F.A. in Creative Writing from Point Park University
- Mac or PC: Both
- Android or iOS: iPhone
Mary's Latest Articles
-
The 8 Most Devastating DDoS Attacks of 2022 (And Why They Still Matter)
The threat landscape continued to evolve in 2022 as DDoS attacks became part of cyberwarfare between nations. But what are they, and how can you become an unwitting part of their attack?
-
The Best VPNs for iPhone and iPad 2026
Using a virtual private network app or VPN app when away from your home network is the best way to secure your iOS device from hackers and cybercriminals. Here are three of the best we've tested.
-
VyprVPN Review 2026: A Security Powerhouse
VyprVPN is a security superstar that delivered on fast speeds during our testing, top security, and proprietary servers that will keep your device protected for a low cost.
-
How To Avoid Spam by Masking Your Email Across the Web
Spam email isn’t just annoying, it can also contain harmful malware; email masking can keep your email address private and secure.
-
The Best VPNs of 2026: Independently Tested and Editor-Approved
In our first-ever Editor’s Choice VPN Awards, we explore all of our tried and tested VPNs to name the best of the best.
-
Adblock Plus Review 2026: This Free Extension Secures Your Data
Browsing the internet can be a clutter-filled and even dangerous experience, but Adblock Plus is trying to change all that with its free service.
-
How To Identify and Remove the MSASCuiL.exe Virus
The MSASCuiL.exe executable is not a virus. Learn how this file can be used to install malware and what you can do to prevent the infection from taking over your computer.
-
What is 6G Internet? A Guide to the Next Generation of Mobile Communication
Understanding the potential of 6G and how it will transform the way we connect, care, and collaborate
-
Mozilla VPN Review 2026: Do Its Security Features Measure Up?
Explore our testing experience with Mozilla’s VPN, and see whether it’s the right choice for your online security needs.
-
Application Whitelisting and How It Better Protects You
Application whitelisting is a buzzword in the tech community, but what is it and how can it be harnessed to make the internet a safer space for everyone?
-
The Best VPNs for School and College 2026
Unlock freedom on your school or college network with a VPN that is built to help you get the most from the internet.
-
How To Keep Seniors Safe in the Digital Age: A Social Media Guide
We've put together an in-depth guide for both seniors and caretakers that looks at common forms of social media fraud, how to prevent them, and resources for when you get scammed.
-
Is COM Surrogate a Virus or a Legitimate Process?
Uncovering the truth about COM Surrogate: What it is, what it does, and how to protect your PC.
-
6 Simple Steps to Protect Your Phone and Webcam from Hackers
Maximize your online security: A step-by-step guide to protecting your phone and webcam from hackers.
-
Hotspot Shield Review 2026: Does It Secure Your Data?
Our Hotspot Shield review explores the pros and cons of its security measures, speed, compatibility, and user-friendliness.
-
How To Disable McAfee Antivirus: A Comprehensive Guide
Learn the simple and effective way to temporarily or permanently disable McAfee antivirus on your device.
-
What Is Phishing-as-a-Service and How Can Anyone Become a Hacker?
Uncovering the definition, methods, and consequences of phishing-as-a-service, as well as how to protect yourself.
-
The Dangers of IP Spoofing and How to Protect Yourself
IP spoofing can affect your security. Learn how to use a VPN to mask your IP address and protect against IP spoofing attacks like DDoS, MitM, and more.
-
How to Log in to a Linksys Router: Step-by-Step Guide
Unlock the full potential of your Linksys router with these easy login steps and troubleshooting tips.
-
18 Facebook Marketplace Scams (And How To Avoid Becoming a Victim)
Ecommerce opens up a broad array of goods, services, and job opportunities in our interconnected world. Make sure you know what’s legit online before handing over cash or information.
-
What Is a Man-in-the-Middle Attack and How Can You Stay Safe?
Man-in-the-middle (MitM) attacks intercept your web communications, allowing hackers to steal your login credentials and financial data. But MitM attacks are preventable with the right tools and online safety practices.