Panera Bread Ignored Data Breach Warning, Said it was a “Scam”

Panera Bread Ignored Data Breach Warning, Said it was a “Scam”

Apr 3, 2018

Panera Bread has suffered a major data breach, affecting potentially 7 million customers. The data is said to include names, email addresses, and credit card information. What’s worse – the data could have been crawled and indexed with simple automated tools. This wasn’t

Read More
Are The Shadow Brokers Like Snowden? Theory Suggests Insider Hack

Are The Shadow Brokers Like Snowden? Theory Suggests Insider Hack

Aug 23, 2016

By now, most of our readers have heard of the Shadow Brokers, the hacker group who obtained a large trove of data from the National Security Agency (NSA) and leaked information about the NSA’s cyber tools. The cyber tools were apparently stolen from

Read More
Facial Recognition gets “Hacked” Thanks to Facebook

Facial Recognition gets “Hacked” Thanks to Facebook

Aug 22, 2016

Facial recognition technology is utilized in many different systems. Biometric software is used in facial recognition tools for security purposes and other applications such as social media marketing. Algorithms use a statistical approach to identify facial features – and facial recognition is increasingly

Read More
Should Uber Drivers be Fingerprinted in Background Checks?

Should Uber Drivers be Fingerprinted in Background Checks?

May 8, 2016

I’ve heard a LOT of talk recently about Uber and Lyft’s pending exit from the Austin, TX marketplace, and I can’t say that I blame them. On one hand — Government “regulation,” only stifles competition… but on the other, when one realizes that

Read More
Gesture Analysis: Could your Movements be Hacked?

Gesture Analysis: Could your Movements be Hacked?

May 7, 2016

Smart phone and tablet developers will need to put better security measures in place to keep hackers and governments out of their devices. Many newer generation devices implement fingerprint readers in place of passcodes, which are often promoted as a stronger security feature.

Read More
New Security Measures from Gmail (VIDEO)

New Security Measures from Gmail (VIDEO)

Mar 25, 2016

Have you noticed some of the changes lately in your Gmail inbox? You may have received an email from a friend or colleague and saw that it had an unlocked red padlock next to it like this: When you hover over the padlock,

Read More
Skype Will Better Protect Users by Hiding IP Addresses

Skype Will Better Protect Users by Hiding IP Addresses

Jan 23, 2016

Skype has announced that in their new update, they will finally hide your IP address so that you are protected from “trolls”. This news is especially good for gamers who often find themselves DDoS’d by gaming rivals. There have been many YouTube tutorials

Read More
How Do SSL Certificates Work?

How Do SSL Certificates Work?

Nov 9, 2015

How do you exchange private data over the internet? Part of the answer lies with SSL certificates. Secure Socket Layer (SSL) certificates work by creating a private line of communication in which allows private data to be delivered. The main problem with communication

Read More
The Importance of Two-Factor Authentication

The Importance of Two-Factor Authentication

Nov 1, 2015

Security is not about whether something can be cracked or hacked. The fact is that, given enough resources, anything can be hacked. This is especially true for social media accounts. However, the goal is to balance security measures with the severity of what would happen if

Read More