Attacks

WordPress Is King—But Vulnerable—And Not Immune To Attack

If there is a God of the digital world, WordPress might as well be it. It is considered by the masses as the “go-to” tool for website or blog creation—and as an internet platform, it powers a staggering one third to one half of all websites in existence, stealing a substantial portion of market share

[ Read More ]

Hack Email Passwords in Minutes Using Dubious Ways

It is a well-known fact that our oceans are over fished. As if that is not enough, so too are our inboxes. While a different kind of “phishing”, email hacking and scams are increasing with every turn of the tide, most of us count on our email provider to include a level of spam filtering

[ Read More ]

Really, How Safe Is The Camera On Your Device?

These days, we take our mobile cameras pretty much for granted, regardless of whether we’re using our phone, tablet, laptop, or PC—either at home or work—to capture the the special (or even quite ordinary) moments of our lives. We are putting out tons of images each day and often consuming them as well through social

[ Read More ]

Is Your iPhone Making The Bad Guys Rich? You Better Know!

Apparently, some people think iPhones aren’t vulnerable to viruses and other types of malware. This simply isn’t true. Sure, iPhone’s operating system, iOS, has some real security advantages over Android, but that’s not where the story ends. iPhones need to be “jailbroken” if you want to install apps outside of the App Store, which means you

[ Read More ]

Attacks On Your Consumer Data Are The Worst Trick Of The Season

When it comes to our rights as consumers, constant data breaches put our privacy and our safety at risk, often without our knowing it. We are at the mercy of large corporations, government organizations, financial institutions, and healthcare providers. Each time we open an online account, enter our contact information and make a purchase we

[ Read More ]

Hacking Your DNA: What You Need To Know About The Testing Dilemma

The fact that we can now unlock centuries of family health history and heritage through DNA testing is nothing short of a miracle. Who would have thought 100 years ago, much less 50 years ago, that we would be able to map diseases, solve crimes, or identify Fido’s unique combination of breeds through one simple

[ Read More ]

You Need To Understand The Benefits Of Third-Party Pentesting

As we know, penetration testing, fondly known as “pen testing” is one of the best ways to visualize a computer system—and more importantly, all of its flaws and weaknesses as seen through the eyes of a potential attacker. Pen testing allows users and businesses to view their own digital landscape from an threat perspective—a bird’s

[ Read More ]

Is Your Smart Device Spying on You?

Who are “they” anyway? This perennial question has been asked for decades—and now that we have reached the 21st century, the question has taken on new meaning. With the advent of Artificial Intelligence (A.I.) and mainstream consumer access, the new question is not if someone is listening, but who is listening and what are they

[ Read More ]

What Happens When GPS Spoofing Takes Down A Power Grid?

When the layperson thinks about GPS, they typically visualize themselves conveniently driving with a nice, clear Google Map displayed on their smartphone to show them precisely where they are at all times. In fact, that’s how the vast majority of consumers directly interact with this type of technology—but like most digital things, there’s a bit more

[ Read More ]

Debit Or Credit? How To Protect Your Money From Unbelievable Scams

With almost weekly revelations about new, big data breaches or malware attacks, it’s easy to get numbed into complacency. Especially when doing otherwise might introduce inconvenience into our daily lives.  But literally, can you, afford to ignore these and similar threats? Global losses due to fraudulent credit card, debit card, and mobile payment transactions reached

[ Read More ]