A birthday isn't something you might think of as private information. Almost everyone celebrates them on social media, and quite a few people post them on their profile.
That's a horrible idea and here's why.It's Probably One of Your Security QuestionsAlong with the model of your first car and your mother's maiden name,…
Another Week, Another Security Flaw
Foreshadow, also known as L1 Terminal Fault, is another problem with speculative execution in Intel’s processors. Foreshadow may allow malicious software to break into secure areas that even the Spectre and Meltdown flaws couldn’t crack.
What Is Foreshadow?
Specifically, Foreshadow attacks Intel’s Software Guard Extensions (SGX) feature. This is built into Intel chips…
Hacking: Not Restricted To Computers
You can have the best devices and security measures and still fall victim to a hacker... even on your cell phone. After all, it has an operating system just like a computer and ways to wiggle in through exploits.Got an Apple device? Don’t think that you're exempt from a phone…
VPNs Becoming More Recommended After Legislation
With recent political legislation regarding your Internet Service Provider's ability to sell your information freely, now might be a good time to look into getting a VPN (Virtual Private Network). A VPN gives you the ability to encrypt and hide your footprint on the Internet.Some might ask, "Why would…
Requesting a ransom from victims is an trend gaining momentum in the hacking world. This is typically done using ransomware (where hackers encrypt data and request money for the key) and distributed denial of service attacks (where hackers threaten to overwhelm a system with traffic, thus knocking it offline). In both scenarios, hackers are looking…
As a business owner, you rely on your WiFi router to reliably broadcast a network connection to your entire office. This is generally a private network that you won’t want to share with just anyone. The only problem with this is that guests visiting your office might want to use the wireless Internet and allowing…
With social media playing such an important role in everyone’s day-to-day lives, one has to wonder how this can affect the security of online accounts and profiles. Social media might have revolutionized the way we communicate with others, but it’s also revolutionized the way that hackers stalk their victims.Imagine this worst case scenario:
Hackers can impersonate…
Zimperium attempts to light fire a under the Google Security Division.
Does Stagefright sound familiar? Back in April, mobile security firm Zimperium (based in San Francisco and Tel Aviv) released a statement showing they found a flaw/exploit in the Google Android operating system. Zimperium shared their findings and data with Google at that time and…
The answer is "yes, your security program absolutely needs maintenance."
Every organization should have an information security program, which most people recognize. However, what most don't realize is that their program needs proper upkeep or maintenance. There should never be a point where an organization is overconfident after implementing a security program because there is always room…
An Uneasy Trust Between Humans and Robots
The point of living in a world where robots and technology take over everything is that they're supposed to make life easier. But imperfect humans are responsible for creating these technologies, allowing flaws and oversights to sneak in. Some of these are simply annoying while others can put us in…
We’ve published several blog articles about enterprise security technologies, but it’s equally important to focus on the other side of the security equation and make sure people know how to properly log off, lock, and walk away from their work space. To that end, even something as (seemingly) mundane as forgetting to lock your computer…
As a business professional, you have a responsibility to ensure that your company’s network and data is protected from hacking attacks. It can be difficult to remember to take all of the necessary precautions, but with our help, you can easily outline all of the measures that should be taken to maximize security for corporate…