Guest Post – Don’t Let Your Phone Stalk You

The idea of someone tracking your whereabouts and eavesdropping on your conversations can be unsettling. Yet, more than 58,000 Google Android users had this happen to them. That’s because these individuals had stalkerware installed on their smartphones.  Stalkerware is legal but often considered unethical. Find out what stalkerware is and how it can get on your smartphone.

Stalkerware is not limited to Android phones. It can be installed ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from Bruce Schneier.


Why We Can’t Give the Cops Encryption Back Doors

Bruce Schneier explains once again why encryption back doors for cops means back doors for crooks too.  “The Crypto Wars have been waging off-and-on for a quarter-century. On one side is law enforcement, which wants to be able to break encryption, to access devices and communications of terrorists ...

Continue Reading →
0

Most Americans Unaware of Personal Data Loss

Data breaches.  It seems that every week some other company is featured in the news as the latest victim.  But who really is the victim?  The company that was breached, or the people whose personal information was stolen?  Have you been affected by a data breach?  How would you know?

A recent survey published on Lexington Law ask over a thousand people whether they knew if their data ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Tax Identity Theft: Protecting Your Credit and Finances

Check this out from the Simple Dollar.  Tax-related identity theft is a growing problem in America, and the more security breaches, information hacks and digital business we do as a society, the more consumers who fall victim to it. In fact, in 2016 alone, thieves stole more than $21 ...

Continue Reading →
0

It’s Not Just Phishing – Other Ways Email Is Exploited – Part 2

On Monday we investigated five ways that your email account can be used to initiate an cyber-attack against you.  Today we finish up this article with another five email attack vectors.

  • Clickjacking – In traditional click-jacking, a malicious email link actually direct you to a malicious or impostor site.  A new version places something that looks like a dirt spot or hair on the web page and when the user tries to ...
Continue Reading →
0

Collections 1-5 – Is This The Biggest Data Breach Ever?

Troy Hunt, of HaveIBeenPwned fame, on January 17 reported what may be the biggest data breach ever.  Collection #1 is a set of email addresses and passwords totalling 2,692,818,238 rows.  That’s right, 2.6 billion rows.   773 million records, from over 12,000 files, with a total size surpassing 87 gigabytes.  That’s a lot of personally identifiable information ...

Continue Reading →
0

Watch Out For Social Security Scammers

Your phone may be ringing soon with a fraudulent call from the “Social Security Administration” about problems with your social security number.  The Federal Trade Commission is warning consumers about this fraud.  A transcript of a typical call is below.

“…law enforcement agencies to suspend your Social Security number on an immediate basis, as we have received suspicious trails of information in your name. ...

Continue Reading →
1

Phishing – Not Just For Email Anymore

You know those surveys, games, and “like and copy” messages that your Facebook “friends” share with you?  Would you be surprised to learn that many of these “fun with friends”  activities are just cover for a new form of phishing exploit?  In the last few years phishing attacks have evolved from a primarily email-based attack into attacks using other vectors including surveys, games, gifts and prizes, and social networks.

Continue Reading →

0
Page 1 of 12 12345...»