Security
-
How They Attack Us Series
Cybercriminals have no rules, no code, they will anything and everything to get through your security controls and at what they want most, your data. This is the first of […]
-
Ransomware Facts, Trends & Statistics for 2020
As the digital underworld expands to include a broader range of cyber attacks, ransomware increases its harsh financial impact across the globe — estimated to grow to $20 billion by […]
-
The Best Internet Security Software In 2020 – From Internet Advisor
The internet has given us so much freedom and opportunity that it’s often easy to forget that our constant connectivity leaves us vulnerable to many threats. The risks we face […]
-
Threat Modeling – Why It’s More Important Than Ever
Threat modeling is the process to layout a system with a security risk point of view to answer the question, “What can go wrong with this?”. The process of threat […]
-
How Multi-Factor Authentication Protected My Nintendo Account
A few days ago, in the middle of the day, while I was working, I received a text message with a two-factor code from Nintendo. However, I was not on […]
-
Those Facebook Posts Are Social Engineering Gold Mines, Stop Answering Them
Remote work, distance learning, isolation, quarantine or whatever other terms you want to place on the current situation, socializing digitally is the new norm. Social networks are truly the lifeblood […]
-
Application Development, Zoom And Why Security Cannot Be Optional
What a month it has been! I am not talking about the world pandemic, this is a cybersecurity blog, I am talking about Zoom. The video conferencing app that was […]
-
Tax Identity Theft Awareness Week Feb. 3-7, 2020
This week is the Federal Trade Commission’s Tax Identity Theft Awareness Week. The first week of February is technically the first week you can file your taxes completely as the […]
-
OWASP API Security Top 10 2019 Has Been Published
The Open Web Application Security Project (OWASP) is the non-profit organization behind the OWASP Top 10. As the application development landscape changes and evolves so does the security requirements and […]