Here is an infographic from Venture Beat.
Continue Reading →
Here are a couple of tiny, portable security devices that provide hardware firewall, VPN, and TOR capability. Check them out.
10/25/2018 09:15 PM EDT Original release date: October 25, 2018
The Federal Trade Commission (FTC) has ...Continue Reading →
Now that I know everything about you, maybe I can predict what you are likely to do in the future. In the first two parts of this report, we looked at Google and the many products and services that collect information about you, and just what kind of details are included in that informational trove. Today we will see what that information can do.
Whether you call it bots, AI (artificial intelligence), ...Continue Reading →
What would you think about one company knowing nearly everything about you? After today’s article, you will have a fairly complete understanding about just how much of your information is collected by one company – Google.
Let’s start by looking at many popular Google products and services and just what information they collect about their users.
Spying, intelligence gathering, surveillance, reconnaissance, eavesdropping, tracking – the Internet has made these activities much easier than they used to be. The NSA, CIA, Russia’s Fancy Bear, China, North Korea – which organization is gathering more information about more people than probably any other. While your information is unlikely (hopefully) to be in the NSA, CIA, or other governmental databases, a lot of information about you and me are certainly in ...Continue Reading →
Six routers with serious security flaws are considered end of life (EOL) and may never be updated. The D-Link models affected are the DWR-116, DWR-140L, DWR-512, DWR-640L, DWR-712, DWR-912, DWR-921, and DWR-111, six of which date from 2013, with the DIR-640L first appearing in 2012 and the DWR-111 in ...Continue Reading →
In our last post we looked at several problems you might encounter using two-factor or multi-factor authentication. If you have two-factor authentication, or are thinking about using it, there are some additional steps you should take in case you lose your second factor and have to re-establish access.
I am admittedly a huge proponent of two-factor and multi-factor authentication. For me, TFA, 2FA, and MFA have allowed the password some badly needed extended life as a secure authentication method. With multi-factor authentication, losing your password to an attacker is not enough for them to gain access to and compromise a system, resource, or account.
Multi-factor authentication requires a user to log into ...Continue Reading →
If you have a Symantec certificate on your HTTPS website, Chrome 70 and Firefox 63 will both be disowning any web certificates signed by Symantec. From this month forward, anyone with Chrome or Firefox who browses to a web page “secured” with a Symantec certificate will see an unequivocal warning insisting that ...Continue Reading →
Today we are featuring a guest column written by Jann Chambers at UK Web Host Review.
If there is one thing that all website owners today need to be concerned about it is website security. This is especially the case if you take online payments for your products and services.
You only need to do a quick search online and you will see ...Continue Reading →