Cybersecurity Faces Personnel Shortage – While Attacks Escalate
Post

Cybersecurity Faces Personnel Shortage – While Attacks Escalate

There is a widening gap of talent in the cybersecurity industry due not only to growing cybercrime, but also to our ever increasing dependency on technology in terms of where and how we are social, purchase products, and ever more frequently entertain ourselves. Presently, there are not enough people to fill

Equifax Breach: 143 Million Americans Affected – Out Cry.
Post

Equifax Breach: 143 Million Americans Affected – Out Cry.

The FTC seems to be minimizing a data breach at the credit reporting agency Equifax that lasted 10 weeks from mid-May through July 29. Hackers accessed names, social security numbers, birth dates, addresses, and driver’s license numbers. They also obtained 209,000 credit card numbers.

Matter-of-fact reporting

Social Media Sees 70% Rise In Cyber Crime in Six Months
Post

Social Media Sees 70% Rise In Cyber Crime in Six Months

Recently Twitter hired security company OurMine to hack their systems in order to find holes in its security. This isn’t surprising as studies show that cyber crime in social media grew 70% in the last sixth months. If you search “botnet,”” “hacking,” “DDoS,” or anything related to cybercrime on most social media, and you’ll find

$5 Million a Day In Online Advertising Fraud – Methbot
Post

$5 Million a Day In Online Advertising Fraud – Methbot

An elaborate cybercrime bot is responsible for stealing between $3 million and $5 million worth of revenue from online publishers and video advertising networks each day. The scam runs as a vast network of cloaked Internet addresses, in rented data centers, on bogus websites, with fake users all made to look like real people are watching short...

Lorrie Cranor, Chief Technologist of the FTC on How to Safeguard Your Smart Phone
Post

Lorrie Cranor, Chief Technologist of the FTC on How to Safeguard Your Smart Phone

Statistically, there’s a good chance you’re getting a new smartphone for Christmas. And now days, if you had to, you could run a small business right from your phone. However most people use their smartphones for day-to-day tasks like replying to email (i.e. Gmail, yahoo mail, etc.); checking social media (i.e. facebook, twitter, etc) and staying organized with Apps like online calendars, DropBox and Evernote. But it’s turning out that using your smartphone at all could lead to being taken advantage of by people that make a living from gaining access to your identity through your smartphone––information that is used to verify that you are in fact you.

Few people realize just how vulnerable cell phones are. A phone can be breached using as simple of a thing as a CCSS 7 (or common channel signaling system no.7) through your very phone number.

Target Marketing Good Vs Bad
Post

Target Marketing Good Vs Bad

Marketing and advertising is constantly evolving. Companies battle for position to grab our attention, not just to make a sale but to build familiarity with their brand. It works, even today as you are more likely to make a sale if someone has heard of your brand before. The next time you go into a...

Why Is Dooth Private Internet Free?
Post

Why Is Dooth Private Internet Free?

We all like free things but they are usually meant to get us in the door, get us to spend more money on something else or meant as a trial that only lasts for a few days or weeks. So when Dooth announced they are offering their private internet platform for free there were some questions that...

End To End Encryption
Post

End To End Encryption

Everyone understands the world of the private internet at different levels. Some people can check their email with ease but struggle to understand Facebook. Others can handle most tasks with ease but struggle with understanding how things actually function. What’s a ram, what’s a GB, what’s end to end encryption? Don’t beat yourself up if...

What’s Even Creepier Than Target Guessing That You’re Pregnant?
Post

What’s Even Creepier Than Target Guessing That You’re Pregnant?

The age of big data is frightening to a lot of people, in part because of the implicit promise that algorithms, sufficiently supplied with data, are better at inference than we are. Superhuman powers are scary: Beings that can change their shape are scary, beings that rise from the dead are scary, and beings that...

  • 1
  • 2