Hiding from the Biggest Spy on the Internet – Part 4

In our last three posts, we dissected the data collection program on one of the biggest Internet companies, the King of the Internet, Google.  Today we are going to provide you with a small set of options you can use to reduce and sometimes eliminate your exposure to data collection, and increase your privacy while online.  These solutions will work well not just against Google, but also against the data collection ...

Continue Reading →
0

The Biggest Spy on the Internet – Part 3

Now that I know everything about you, maybe I can predict what you are likely to do in the future.  In the first two parts of this report, we looked at Google and the many products and services that collect information about you, and just what kind of details are included in that informational trove.  Today we will see what that information can do.

Whether you call it bots, AI (artificial intelligence), ...

Continue Reading →
0

The Biggest Spy on the Internet – Part 2

What would you think about one company knowing nearly everything about you?  After today’s article, you will have a fairly complete understanding about just how much of your information is collected by one company – Google.

Let’s start by looking at many popular Google products and services and just what information they collect about their users.

  • Google Account – Not everyone has a Google account, but if you have an Android phone you ...
Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Potential Hurricane Florence Phishing Scams

09/14/2018 02:19 PM EDT

NCCIC warns users to remain vigilant for malicious cyber activity seeking to exploit interest in Hurricane Florence. Fraudulent emails commonly appear after major natural disasters and often contain links or attachments that direct users to malicious websites. Users should exercise caution in handling any email with a subject line, attachments, ...

Continue Reading →
0

Replacing Passwords and Pins with Icons

We have discussed the sorry state of passwords in many recent articles.  There is an alternative to passwords and pins that may be coming to a smartphone near you.  It is called SemanticLock and it uses emoji-like icons to unlock your smartphone.

Most smartphones go unsecured mainly because most people find it difficult to enter a password using the on-screen keyboard.  4 to 6 digit numeric PINs are slightly ...

Continue Reading →
0

Where Does Cell Phone Location Data Go?

Have you ever wondered what happens to the location information your smartphone is collecting about you?  Who has access to that information, and for what purpose?  As it turns out, as told in a recent report by Brian Krebs, this information is available to pretty much anybody.

A related article in Sophos’ Naked Security blog pointed to a Continue Reading →

0

Android Things Promises to Close IoT Security Holes

IoT or the Internet of Things has been to this point a seriously unsecured cluster-flop for the most part.  Millions of insecure devices are in our homes and businesses, and these devices may be eavesdropped, recording audio or video, performing a DDoS attack, or being leveraged as an easy access pivot point into your network for further exploitation

Thankfully, progress is being made in ...

Continue Reading →
0

How Secure Are Mobile Payment Apps Anyway?

The latest trend in the card payment universe are the mobile payment apps that let you use a smart watch or smartphone in place of a credit card.  Just how secure are these payment systems?  One of my regular readers, Eric Morley, owner of Big Frog Custom T-Shirts in Woodbury, MN, asked me that question via LinkedIn, and I thought it was a great idea for an article.  ...

Continue Reading →
0

Crypto-Mining Exploits On The Rise

Fighting cyber-crime is a lot like whack-a-mole.  By the time cyber-defenders come up with countermeasures that work against one exploit, the cyber-criminals have moved on to another different and more profitable exploit.  Old malware is updated with new versions, and the new versions often slide right by the same defenses that stopped the old version.

Cyber-crime has moved from spamming, fake anti-virus, credit card fraud, and “Canadian” pharmaceuticals, to password cracking, phishing, ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Tax Identity Theft Awareness Week

File early or an impostor may get your refund.  Especially now that the Equifax credit trove is in the wild.

01/29/2018 08:27 AM EST  Original release date: January 29, 2018

Tax Identity Theft Awareness Week is January 29 ...

Continue Reading →
0
Page 1 of 3 123