Panera Bread Ignored Data Breach Warning, Said it was a “Scam”
Panera Bread has suffered a major data breach, affecting potentially 7 million customers. The data is said to include names, email addresses, and credit card information. What’s worse – the data could have been crawled and indexed with simple automated tools. This wasn’t
Facial Recognition gets “Hacked” Thanks to Facebook
Facial recognition technology is utilized in many different systems. Biometric software is used in facial recognition tools for security purposes and other applications such as social media marketing. Algorithms use a statistical approach to identify facial features – and facial recognition is increasingly
Should Uber Drivers be Fingerprinted in Background Checks?
I’ve heard a LOT of talk recently about Uber and Lyft’s pending exit from the Austin, TX marketplace, and I can’t say that I blame them. On one hand — Government “regulation,” only stifles competition… but on the other, when one realizes that
New Security Measures from Gmail (VIDEO)
Have you noticed some of the changes lately in your Gmail inbox? You may have received an email from a friend or colleague and saw that it had an unlocked red padlock next to it like this: When you hover over the padlock,
Skype Will Better Protect Users by Hiding IP Addresses
Skype has announced that in their new update, they will finally hide your IP address so that you are protected from “trolls”. This news is especially good for gamers who often find themselves DDoS’d by gaming rivals. There have been many YouTube tutorials
How Do SSL Certificates Work?
How do you exchange private data over the internet? Part of the answer lies with SSL certificates. Secure Socket Layer (SSL) certificates work by creating a private line of communication in which allows private data to be delivered. The main problem with communication
Are The Shadow Brokers Like Snowden? Theory Suggests Insider Hack
By now, most of our readers have heard of the Shadow Brokers, the hacker group who obtained a large trove of data from the National Security Agency (NSA) and leaked information about the NSA’s cyber tools. The cyber tools were apparently stolen from