Man in the middle attacks. Social engineering. Large scale data breaches. Government surveillance. Device theft. Those are just some of the threats standing in your way as you try to carry on a safe digital life.
APTs. Three letter agencies. Script kiddies. State-sponsored hackers. Cybercrime rings. Data-hungry corporations. Jealous coworkers. Disgruntled employees.
And those are just some of the sources that those threats might come from.
The point is, as more of our lives become digitized and stored on computers and online servers, our data becomes more valuable and makes us more vulnerable to cyberattacks. Continue reading
In a controversial Friday 13th scoop, The Guardian unveiled a backdoor in WhatsApp, the popular messaging app owned by Facebook that has over 1 billion users and touts having unbreakable security.
Within a few hours of the Guardian report, the claim was debunked by other outlets, including this detailed piece in Gizmodo. While it is now clear that the backdoor is actually not a backdoor but a natural functionality of the messaging app, here’s what you need to know and what you can do to protect yourself from potential security mishaps. Continue reading
The holiday season is a big time for consumer electronics and smarthome gadget sales. With so many advances and innovations that we saw in the Internet of Things in 2016, there’s a likely chance that one of those connected devices has found its way into your home, or that of one of your loved ones, this Christmas.
But while IoT devices make our homes more efficient, drive energy saving and reduce costs, you should also take note that IoT devices are a source of security headaches. A huge number of smarthome gadgets are developed without sound development practices and end up being used for evil purposes. Continue reading
By Michael Conley
Your internet security is something that must be constantly kept under control, but unfortunately for us, this is no easy task. As time goes by, cybercriminals are finding more and more ways to slither their way into our devices and get a hold of our personal information, which is not an encouraging thought.
Thankfully, with some light research and caution, we can avoid much of internet’s threats and browse the web safely, which is why we will provide you with some tips on how to do it right. These are simple rules of conduct to follow and once you get the hang of it, you’ll see that staying secure online doesn’t have to be hard work. Continue reading
News broke last week that Yahoo has allowed intelligence agencies to scan user emails. This comes at a very bad time for Yahoo, right on the heels of its 500 million user account data breach—made public earlier this month—and while the company is trying to be acquired Verizon for the meager price of $4.8 billion.
Other tech giants immediately denied having had similar cooperation with government agencies in the wake of the Yahoo leak, though they all have a track record of wholesaling their data to government agencies under the NSA’s PRISM program. Continue reading
I love Google—can’t get enough of it in fact. It allows me to search the entire internet at the speed of lightning, takes care of my emails, calendar, documents and whatnot. And it has also provided me with the main web browser I use on non-Mac computers.
And it’s giving me all this for free. Or is it?
In fact, it’s not. Google is a for-profit business and is not in the habit of making generous pro bono giveaways. In exchange for the services it offers, the firm collects tons of data from each of its users, and we all know that data is the currency of the future. Continue reading
Guest post by Simon Parker, courtesy of Minerva Security
Both small and large corporations are tasked with securing their networks and computer systems, particularly from intruders who want to hack into them to gain access to sensitive and confidential information. For this reason, putting the appropriate safety measures in place is critical to these organizations, specifically in an environment where any company is subject to these fraudulent acts. In fact, based on information that was provided by researchers in the United Kingdom, approximately 50% of their business’ systems are currently at risk because they do not have the efficient computer security procedures established. Continue reading