Cybersecurity Certifications: Do They Really Matter?
An important weapon in the war on cybercrime is the hundreds of thousands of cybersecurity professionals working day in and day out to protect organizations around the globe. These are the “good guys” and we need to give them as much of an edge as we can against all the cyber baddies out there. Comprehensive
[ Read More ]Ransomware For Sale On The Dark Web Is A Killer Bargain For Criminals
Black Friday will be here before we know it. While some people like to drive to malls and big box stores to start their Christmas shopping, others prefer to stay home and enjoy find their shopping deals online. But if you happen to be a cyber attacker, you don’t have to wait until Black Friday
[ Read More ]Have You Been Fooled By An Insidious Text Message?
It’s completely understandable if checking your voicemail on your smartphone has become a dull chore. These days, people trying to reach you likely do so via email or text message. If you want to talk to someone using your actual voice, you may prefer using Skype or Google Hangouts or one of a plethora of
[ Read More ]Is Blockchain Technology A Solution For IoT Security Problems?
At first, making all of our machines and devices “smart” seemed like a great idea—and in many ways, it ways. The digitization of our very lives through the internet of things (IoT)—including conveniences like Bluetooth speakers, iPhones, and voice-activated baby monitors—has changed the landscape of our day-to-day experiences and made them easier, more intuitive, and—well,
[ Read More ]The Revealing Truth About The Poor Security Of IP Targeting
An Internet Protocol (IP) address is like a digital passport to the wonderful world of the web. Right now, this post is being written from this location on the internet: 2605:6000:e9c4:b700:304a:2f6c:23bc:3333. It’s not just a virtual address—it’s also tied to my specific physical geographical location. That is, unless I’m using a VPN. Can you figure
[ Read More ]Spotlight On 1984, The Year Apple Honored Orwell With Technology
Some people would say the first real glimpses into our future as a totalitarian state, where the Thought Police and rampant surveillance have become the rule rather than the exception, came in the form of George Orwell’s novel 1984. As the main character, Winston, moves throughout his days, at home and at work, he is
[ Read More ]A Chilling IoT Reality: Will My Refrigerator Be Hacked?
With the advancement of the ‘connected cloud’ the Internet of Things (IoT) has also taken flight. Not long ago, IoT was a futuristic glimmer in the eye of blue chip brands like GE and Viking. Manufacturers of refrigerators, toasters, microwaves, and printers would have had to store data locally on the device itself instead of
[ Read More ]Why Your Privacy Is Now The Sacrificial Lamb Of The Modern World
Americans have a strange and complicated relationship with privacy. While they love nothing more than “flexing” on social media—toes in the sand, vacations, nice dinners, proud family moments, half-nude selfies—they are also quick to complain when outside entities become too intrusive on their personal space. They love to “see and be seen,” just as long
- Jenn Jeffers
- 0
- Lessons
- 1
- 7.1K
Really, How Safe Is The Camera On Your Device?
These days, we take our mobile cameras pretty much for granted, regardless of whether we’re using our phone, tablet, laptop, or PC—either at home or work—to capture the the special (or even quite ordinary) moments of our lives. We are putting out tons of images each day and often consuming them as well through social
[ Read More ]Searching For Privacy: Is Google Its Own Worst Enemy?
On October 26, Google announced it would give more data security control back to its users, as they will now be able to review and delete their recent Search activity, as well as allowing them to learn more about Google Search works with their own data. In the coming weeks, these options will be available from
[ Read More ]