Coronavirus Concerns: More People Working from Home Means More Employer Tracking

Coronavirus Concerns: More People Working from Home Means More Employer Tracking

May 16, 2020

So I’m going to stir up some :poop: , y’all — but bare with me. Generally speaking, I’m of two minds on this subject. On one hand, I’m OK with this. e.g., prior to CommieVirus2020, we would go to work, log on to an employer-provided asset,

Read More
Tinder: Three Things You Probably Didn’t Know

Tinder: Three Things You Probably Didn’t Know

Apr 9, 2018

It all seems very straightforward. Swipe right if you’re attracted to the person on your screen, swipe left if you’re not. Tinder makes the process of finding someone to date seem easy. Individual profiles take only seconds to scan. In under one hour,

Read More
Panera Bread Ignored Data Breach Warning, Said it was a “Scam”

Panera Bread Ignored Data Breach Warning, Said it was a “Scam”

Apr 3, 2018

Panera Bread has suffered a major data breach, affecting potentially 7 million customers. The data is said to include names, email addresses, and credit card information. What’s worse – the data could have been crawled and indexed with simple automated tools. This wasn’t

Read More
Wannacry Ransomware Attack – Updates From Top Sources

Wannacry Ransomware Attack – Updates From Top Sources

May 17, 2017

WannaCry? Ransomware Spreads Globally… A ransomware attack began last week in Europe, targeting thousands of computers running Windows. Ransomware is malicious software that makes it impossible for the user to access their computer files unless they pay a ransom. Ransomware attackers frequently ask to

Read More
Are The Shadow Brokers Like Snowden? Theory Suggests Insider Hack

Are The Shadow Brokers Like Snowden? Theory Suggests Insider Hack

Aug 23, 2016

By now, most of our readers have heard of the Shadow Brokers, the hacker group who obtained a large trove of data from the National Security Agency (NSA) and leaked information about the NSA’s cyber tools. The cyber tools were apparently stolen from

Read More
Facial Recognition gets “Hacked” Thanks to Facebook

Facial Recognition gets “Hacked” Thanks to Facebook

Aug 22, 2016

Facial recognition technology is utilized in many different systems. Biometric software is used in facial recognition tools for security purposes and other applications such as social media marketing. Algorithms use a statistical approach to identify facial features – and facial recognition is increasingly

Read More
Gesture Analysis: Could your Movements be Hacked?

Gesture Analysis: Could your Movements be Hacked?

May 7, 2016

Smart phone and tablet developers will need to put better security measures in place to keep hackers and governments out of their devices. Many newer generation devices implement fingerprint readers in place of passcodes, which are often promoted as a stronger security feature.

Read More
New Security Measures from Gmail (VIDEO)

New Security Measures from Gmail (VIDEO)

Mar 25, 2016

Have you noticed some of the changes lately in your Gmail inbox? You may have received an email from a friend or colleague and saw that it had an unlocked red padlock next to it like this: When you hover over the padlock,

Read More
Skype Will Better Protect Users by Hiding IP Addresses

Skype Will Better Protect Users by Hiding IP Addresses

Jan 23, 2016

Skype has announced that in their new update, they will finally hide your IP address so that you are protected from “trolls”. This news is especially good for gamers who often find themselves DDoS’d by gaming rivals. There have been many YouTube tutorials

Read More
How Do SSL Certificates Work?

How Do SSL Certificates Work?

Nov 9, 2015

How do you exchange private data over the internet? Part of the answer lies with SSL certificates. Secure Socket Layer (SSL) certificates work by creating a private line of communication in which allows private data to be delivered. The main problem with communication

Read More