Guest Post – What Map Apps Track (and How to Get Them to Stop) – Part 1

A lot of very specific location information is being collected about you, me, and every other smartphone user.  The image at left shows everywhere I have been in the last four years, courtesy of Google location services.  If you would like to find out what is being collected about you, and how to make it stop, the next two articles will help.  ...

Continue Reading →
0

The Insider Threat – Part 2

The insider threat, the computer or network attack originating from inside our own network, is the hardest to defend.  In our last post we took a look at the disgruntled employee and the embezzler.  Today we will review insider-based sabotage and corporate espionage.

Sabotage – Sometimes a disgruntled employee will take out their frustrations by orchestrating a little sabotage.  Perhaps they ...

Continue Reading →
0

Guest Post – AI: What should we expect?

Here is another intriguing guest post by Melisa Marzett.

This question was raised long time ago in old science-fiction films. Though those depictions were rather primitive, people started asking questions, for example, what else are they capable of, and how long will it take to develop such intelligence. In these films, the only thing these machines want is to ...

Continue Reading →
0

ISSA Survey Results – Cybersecurity Burnout

Recently the ISSA (Information Systems Security Association) released the results of a survey they took in December 2018.  There is a shortage of qualified cybersecurity professionals; not enough people are entering the field, and those with ten or more years of experience may be leaving the field due to stress, lack of a career path, and ineffective mentoring.

The ...

Continue Reading →
0

Guest Post – The Definitive Guide To VPNs – Part 4

Last week we took a deeper look at VPN services courtesy of a guest post from The Gadget Enthusiast.  This article concludes the series.

VPN and Torrenting

Torrents are just the files that contain the information related to other files and folders that are distributed across the computers. For example, if you want to download a movie using torrent, then ...

Continue Reading →
0
Page 10 of 61 «...89101112...»