Google My Account Helps Control Your Privacy

As ironic as it may seem, since Google knows more about us than even the NSA, Google has stepped up with a new tool called My Account to help people control their online privacy.  If you have been lamenting the loss of personal privacy in the Internet age, here at last is something you can do about it.  It may not address all your concerns, but here is a start.

You will be able to control Sign-in and Security, Personal ...

Continue Reading →
0

Have a WordPress Site? Better Secure It!

WordPresslogoWordPress has become an incredibly popular web design platform, and currently has about a 25% share of all web sites on the Internet.  As an open-source software product that is free to download and use, with a great support and documentation through WordPress.org, and a huge, international development community providing an endless array of themes, plug-ins and widgets, it is easy ...

Continue Reading →
0

Cost of Breach Per Record At $217

The new Ponemon Institute 2015 Cost of Data Breach report was released recently.  This report looks at the costs of 2015 large enterprise class data breaches, but there are some salient pieces of information for small business owners to consider when formulating their cyber security risk management plans.

The average cost per record lost in a data breach increased from $201 in 2014 to $217 in 2015.  Different sorts of records had different costs associated to them.  For instance, more detailed ...

Continue Reading →
0

Your Brain Waves Could Be Your Password

brainwavesWe have been relying on the trusty password for years, but as password cracking technologies improve, even longer and more complex passwords are being solved and sold on rainbow tables.  So passwords are for the most part over.  Two factor authentication is possibly a solution, but biometrics are becoming a big part of what is next in the field of user authentication.  We have already seen fingerprint scanners on some ...

Continue Reading →
0

Privatoria – TOR Plus

TOR, or The Onion Router is a method of surfing the Internet anonymously.  TOR uses a chain of proxy servers and redirection to keep the original IP address (your IP) and hence your identity a secret.  One of the problems with using TOR is that there is a bit of a learning curve, and your Internet browsing speed will likely be reduced to the speed of the slowest Internet connection to one of the proxies in your chain.

There is a ...

Continue Reading →
0

New DARPA Project Memex Brings Search to Dark Web

darpalogoThe Defense Advanced Research Projects Agency (DARPA), the defense department group that brought us the ARPAnet, the nascent beginnings of the Internet, in 1969, has moved into the territory of Google, Bing, and Yahoo, and is creating a search tool called Memex.  The problem with the commercial search engines is that they do not catalog the Internet underground known as the Dark Web ...

Continue Reading →
0

Cybersecurity Pros Train Free at Cybrary

cybraryInformation technology certification has always been a daunting proposition.  The books and study materials are expensive, and classroom training is expensive, and the exams themselves are not cheap either.  Couple these costs with the time it takes to study, prepared, and test, time that can’t be billed to a client, and therefore hits your bottom line.

Finally, some good news for cybersecurity professionals, and those that would like to be: ...

Continue Reading →
0

Windows 10 Security Upgrades: Hello, Passport, FIDO

Windows10HelloWindows 10 will be featuring a built in security feature called Hello, as well as Passport, for online security, and is supporting the FIDO Alliance as well.  Hello will use fingerprint, facial recognition or iris scanning to authenticate you to your computer, and from there, authenticate you to your domain or workgroup resources.  The facial recognition camera ...

Continue Reading →
0
Page 58 of 61 «...3040505657585960...»