Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Tax Identity Theft: Protecting Your Credit and Finances

Check this out from the Simple Dollar.  Tax-related identity theft is a growing problem in America, and the more security breaches, information hacks and digital business we do as a society, the more consumers who fall victim to it. In fact, in 2016 alone, thieves stole more than $21 ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


620 million records from 16 websites listed for sale on the Dark Web

The Register reports that a seller on the Dream Market – a Dark Web marketplace hidden by the encrypted layers of Tor – began offering 16 stolen databases with 620 million accounts.


First it was location, now every app wants your contacts

Why do app developers ...

Continue Reading →
0

Smartphone Malware Exploits On The Rise

Lately there have been a spate of incidents involving smartphone apps for the iPhone and Android phones that were discovered to be malicious in various ways.  The important commonality in these revelations was that cyber-criminals had actually modified legitimate apps by hijacking several developer’s credentials, including their “Developer Certificate.”  The developer key provides a digital signature that validates the app as being the ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


The Computer Programmer Who Ran a Global Drug Trafficking Empire

A new book uncovers the intricacies of Paul Le Roux’s cartel and how it fueled the opioid epidemic ravaging the U.S. today.  This facinating story is covered in detail on the Smithsonian website.  Or read Evan Ratliff’s new book The Mastermind.  I did, and the ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Steps To Take If You Are the Victim of Identity Theft.

It can be overwhelming to learn you’ve been a victim of identity theft. As in your case, crimes involving identity theft and credit fraud are often committed online.


How to share photos without using Facebook

There are other options for photo sharing ...

Continue Reading →
0

Hiding from the Biggest Spy on the Internet – Part 4

In our last three posts, we dissected the data collection program on one of the biggest Internet companies, the King of the Internet, Google.  Today we are going to provide you with a small set of options you can use to reduce and sometimes eliminate your exposure to data collection, and increase your privacy while online.  These solutions will work well not just against Google, but also against the data collection ...

Continue Reading →
0

The Biggest Spy on the Internet – Part 3

Now that I know everything about you, maybe I can predict what you are likely to do in the future.  In the first two parts of this report, we looked at Google and the many products and services that collect information about you, and just what kind of details are included in that informational trove.  Today we will see what that information can do.

Whether you call it bots, AI (artificial intelligence), ...

Continue Reading →
0

The Biggest Spy on the Internet – Part 2

What would you think about one company knowing nearly everything about you?  After today’s article, you will have a fairly complete understanding about just how much of your information is collected by one company – Google.

Let’s start by looking at many popular Google products and services and just what information they collect about their users.

  • Google Account – Not everyone has a Google account, but if you have an Android phone you ...
Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Potential Hurricane Florence Phishing Scams

09/14/2018 02:19 PM EDT

NCCIC warns users to remain vigilant for malicious cyber activity seeking to exploit interest in Hurricane Florence. Fraudulent emails commonly appear after major natural disasters and often contain links or attachments that direct users to malicious websites. Users should exercise caution in handling any email with a subject line, attachments, ...

Continue Reading →
0

Replacing Passwords and Pins with Icons

We have discussed the sorry state of passwords in many recent articles.  There is an alternative to passwords and pins that may be coming to a smartphone near you.  It is called SemanticLock and it uses emoji-like icons to unlock your smartphone.

Most smartphones go unsecured mainly because most people find it difficult to enter a password using the on-screen keyboard.  4 to 6 digit numeric PINs are slightly ...

Continue Reading →
0
Page 1 of 4 1234