Home » hackers » Page 5

hackers

Cybersecurity for your Family and Home

The next life skill that needs to be taught to kids at a young age is cybersecurity for the home, and for the whole family. When I was a teenager and the Internet first came to my city, the only cybersecurity for the home concerns were not meeting strangers you met online, and not giving out passwords.

Things have changed since then. Hackers are more sophisticated and better equipped. And the amount of data at stake has reached exponential levels. You can do plenty to increase your home cybersecurity, and keep your family safer from identity theft and a host of other malicious online attacks. Read More »Cybersecurity for your Family and Home

5 Online Security Goals for your Business this Year

I’m sure you noticed this, but there were a lot of security breaches in 2014. You can read a list of the worst breaches here, but I’m sure you know of at least a few just from general media. Your online security goals need to be stepped up if you hope to protect your business. The odds are good that cyber criminals just haven’t bothered targeting if you weren’t hacked and don’t have these plans in place!Read More »5 Online Security Goals for your Business this Year

Making Internet Security and Privacy Part of your Company Culture

Internet security and privacy is a big topic at every company in the world right now. The Sony hack is showing everyone just how deeply vulnerable company’s are. Better Internet security and privacy ideas are being discussed, but how do you make it part of your company culture? I’m going to look at some of the bad habits that companies get in, and offer up solutions to this.Read More »Making Internet Security and Privacy Part of your Company Culture

Five Best iPad Security Apps for Safer Mobile Browsing

“Wait? Isn’t my iPad magically secured by the fact it’s an Apple product, and the ghost of Steve Jobs?” Blind ignorance is the stuff that hacker’s dreams are made of, and this myth plays right into their hands.

While your iPad is a relatively secure device, it is still vulnerable to the same theft, hacking, and cyber crime as anything else that connects to the Internet. You can call me paranoid if you want, maybe I’ve seen too many things during my time as a security analyst, but I can tell you that your iPad can be hacked.

To help fight the hackers, here are 5 iPad security apps that can slow them down to the point that you’re no longer a valued target, or outright stop them in their tracks.Read More »Five Best iPad Security Apps for Safer Mobile Browsing

6 Ways to Protect your Information in the Cloud: Don’t Get Hacked!

By now, we’ve all heard of The Fappening, where celebrities have had their pictures stolen from the iCloud. How do you protect your information in the Cloud?

Whether you’re a business looking to make sharing easier amongst your company, or a person who wants to access data from different computers, there are six things that you can do to protect your information in the cloud.Read More »6 Ways to Protect your Information in the Cloud: Don’t Get Hacked!

Gmail Password Leak: How to Protect Yourself

A recent Daily Mail article reveals that over 5 million Gmail accounts and their passwords were revealed. A later Forbes article claimed that only 2% of these were valid. No matter what the percentage, it is still a lot higher than zero, and 2% of 5 million is still 100,000. Protect yourself against the Gmail password leak now by changing your password, and reading the rest of this article.Read More »Gmail Password Leak: How to Protect Yourself

The 10 Best/Worst Online Security Myths that STILL Exist

  • News
  • 6 min read

Many people see the Internet as this mysterious place that feeds them information and porn whenever they push the right keys to do that. The basics of how the Internet works, and who has built it, seems to elude most people and this has lead to any number of online security myths being created.

Here are ten of the best/worst online security myths that still exist today. Read it to upgrade your nerd level, and downgrade your ignorance level.
Read More »The 10 Best/Worst Online Security Myths that STILL Exist

Conference CyberSecurity: Keyloggers and Man in the Middle Attacks

There are two common security problems at conferences, and in public in general, that you can protect yourself from with some basic security measures. Conference security is becoming increasingly important as more people not only attend these conferences, but also work remotely in general.

I’m going to look at two conference security issues which you may encounter the next time you’re looking to log onto a public wifi that has been provided, or use a public computer room that is set up for your use.Read More »Conference CyberSecurity: Keyloggers and Man in the Middle Attacks