Hiding from the Biggest Spy on the Internet – Part 4

In our last three posts, we dissected the data collection program on one of the biggest Internet companies, the King of the Internet, Google.  Today we are going to provide you with a small set of options you can use to reduce and sometimes eliminate your exposure to data collection, and increase your privacy while online.  These solutions will work well not just against Google, but also against the data collection ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Tiny Hardware Firewall VPN Client

Here are a couple of tiny, portable security devices that provide hardware firewall, VPN, and TOR capability.  Check them out.


FTC Releases Cyber Resources for Small Businesses

10/25/2018 09:15 PM EDT  Original release date: October 25, 2018

The Federal Trade Commission (FTC) has ...

Continue Reading →
0

The Biggest Spy on the Internet – Part 3

Now that I know everything about you, maybe I can predict what you are likely to do in the future.  In the first two parts of this report, we looked at Google and the many products and services that collect information about you, and just what kind of details are included in that informational trove.  Today we will see what that information can do.

Whether you call it bots, AI (artificial intelligence), ...

Continue Reading →
0

The Biggest Spy on the Internet – Part 2

What would you think about one company knowing nearly everything about you?  After today’s article, you will have a fairly complete understanding about just how much of your information is collected by one company – Google.

Let’s start by looking at many popular Google products and services and just what information they collect about their users.

  • Google Account – Not everyone has a Google account, but if you have an Android phone you ...
Continue Reading →
0

The Biggest Spy on the Internet – Part 1

Spying, intelligence gathering, surveillance, reconnaissance, eavesdropping, tracking – the Internet has made these activities much easier than they used to be.  The NSA, CIA, Russia’s Fancy Bear, China, North Korea – which organization is gathering more information about more people than probably any other.  While your information is unlikely (hopefully) to be in the NSA, CIA, or other governmental databases, a lot of information about you and me are certainly in ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Serious D-Link router security flaws may never be patched

Six routers with serious security flaws are considered end of life (EOL) and may never be updated.  The D-Link models affected are the DWR-116, DWR-140L, DWR-512, DWR-640L, DWR-712, DWR-912, DWR-921, and DWR-111, six of which date from 2013, with the DIR-640L first appearing in 2012 and the DWR-111 in ...

Continue Reading →
0

Solving Problems with Multi-Factor Authentication

In our last post we looked at several problems you might encounter using two-factor or multi-factor authentication.  If you have two-factor authentication, or are thinking about using it, there are some additional steps you should take in case you lose your second factor and have to re-establish access.

  • How do I recover my account?  Learn this in advance of actual need.  Dig into your ...
Continue Reading →
0

Problems with Multi-factor Authentication

I am admittedly a huge proponent of two-factor and multi-factor authentication.  For me, TFA, 2FA, and MFA have allowed the password some badly needed extended life as a secure authentication method.  With multi-factor authentication, losing your password to an attacker is not enough for them to gain access to and compromise a system, resource, or account.

Multi-factor authentication requires a user to log into ...

Continue Reading →
0
Page 1 of 142 12345...»