Security
-
Does Your Contact Tracing App Track Your Location?
Not sure whether the local contact tracing app is tracking your location? You’re not alone. It’s not uncommon for developers or governments to keep things vague with regards to app […]
-
How They Attack Us: Social Engineering
Hackers and cybercriminals are like any other bad guys. They want to make money at your expense. In the digital world that can be done in many ways but one […]
-
Major Privacy Failure Of The Minnesota Absentee Ballot Registration Forms
Working in cybersecurity for 20+ years I am not easily shocked anymore by failures in security and privacy. That changed recently when I received a piece of mail that contained […]
-
How They Attack Us: Phishing
Phishing is the most prominent cyber attack method in use today. The term phishing is similar to regular fishing only derived from the hacker-speak from the old days called phreaking, […]
-
How They Attack Us Series
Cybercriminals have no rules, no code, they will anything and everything to get through your security controls and at what they want most, your data. This is the first of […]
-
Ransomware Facts, Trends & Statistics for 2020
As the digital underworld expands to include a broader range of cyber attacks, ransomware increases its harsh financial impact across the globe — estimated to grow to $20 billion by […]
-
The Best Internet Security Software In 2020 – From Internet Advisor
The internet has given us so much freedom and opportunity that it’s often easy to forget that our constant connectivity leaves us vulnerable to many threats. The risks we face […]
-
Threat Modeling – Why It’s More Important Than Ever
Threat modeling is the process to layout a system with a security risk point of view to answer the question, “What can go wrong with this?”. The process of threat […]
-
How Multi-Factor Authentication Protected My Nintendo Account
A few days ago, in the middle of the day, while I was working, I received a text message with a two-factor code from Nintendo. However, I was not on […]
-
Those Facebook Posts Are Social Engineering Gold Mines, Stop Answering Them
Remote work, distance learning, isolation, quarantine or whatever other terms you want to place on the current situation, socializing digitally is the new norm. Social networks are truly the lifeblood […]