Attacks On Your Consumer Data Are The Worst Trick Of The Season
When it comes to our rights as consumers, constant data breaches put our privacy and our safety at risk, often without our knowing it. We are at the mercy of large corporations, government organizations, financial institutions, and healthcare providers. Each time we open an online account, enter our contact information and make a purchase we
[ Read More ]Hacking Your DNA: What You Need To Know About The Testing Dilemma
The fact that we can now unlock centuries of family health history and heritage through DNA testing is nothing short of a miracle. Who would have thought 100 years ago, much less 50 years ago, that we would be able to map diseases, solve crimes, or identify Fido’s unique combination of breeds through one simple
[ Read More ]How To Negotiate The Relationship Between Security, Privacy, And Trust
Security, privacy, and trust are three very different things—but when it comes to our digital lives, they are all interrelated. It’s tempting to use the three-legged stool analogy here, but it doesn’t quite work because one of these concepts—trust—is more of a lever than a leg. But we’re getting ahead of ourselves… Let’s Start with
[ Read More ]Introducing The Dangerous New Software That Will Ruin You
Heard of Azorult? Well, it’s a form of information-stealing malware with multiple features, including the ability to download even more malware from its command and control servers. Think of it like a Swiss Army Knife for cyber attackers—the little tool that does everything. Azorult was first spotted in early January 2018, although it may have
[ Read More ]Here’s A Warning To The Police: Ransomware Is The New Criminal
In the past, information used by the police department to investigate crimes came in the form of paper documents, resting in physical file folders, housed in a series of file cabinets. These days, not a ton has really changed, as police departments still store data in this type of antiquated, old-fashioned way. But as fields
[ Read More ]Strong New Malware Exploits Microsoft Word For Hidden Attack
One of the main goals of antivirus software is to prevent spyware infections, which cyber attackers can use to breach the confidentiality of your computer’s data. But in order for this malicious spyware to work, it must be able to evade detection by antivirus software. Security researchers have discovered a new cyber attack campaign that
[ Read More ]You Need To Understand The Benefits Of Third-Party Pentesting
As we know, penetration testing, fondly known as “pen testing” is one of the best ways to visualize a computer system—and more importantly, all of its flaws and weaknesses as seen through the eyes of a potential attacker. Pen testing allows users and businesses to view their own digital landscape from an threat perspective—a bird’s
- Jenn Jeffers
- 0
- Attacks
- 0
- 4.8K
Why Artificial Intelligence Will Never Turn The Tables On Man
Overview The terms Artificial Intelligence (AI) and Machine Learning (ML) are among the hottest buzzwords in today’s digital world. As the development and implementation of these technologies grow, their place in our lives continues to be an ongoing source of discussion and even heavier debate. Will these machines soon replace the need for software developers, programmers,
[ Read More ]The Government-Funded Technology Of DARPA Is The Most Insane In The World
Deep within the Pentagon, there is special place just for mad scientists and it’s called DARPA—otherwise known as the Defense Advanced Research Projects Agency. For about sixty years, this rather infamous tech branch of the U.S government has defined themselves as having one “singular and enduring mission,” to innovate breakthroughs technologies in the name of
[ Read More ]Is Your Smart Device Spying on You?
Who are “they” anyway? This perennial question has been asked for decades—and now that we have reached the 21st century, the question has taken on new meaning. With the advent of Artificial Intelligence (A.I.) and mainstream consumer access, the new question is not if someone is listening, but who is listening and what are they
[ Read More ]