Category: Information
-
If You Use iCloud Keychain, Your Passwords Are at Risk
In the past, we’ve written about the dangers of using password managers to protect your most sensitive information. Password managers are often dubbed as a safe way to store information, but that isn’t always the case. Specifically, password managers aren’t protected from the risks of hacks. The two of the most glaring security holes being:…
-
Can you Guess Which State is Most Targeted for Cybercrime?
According to FBI’s Internet Crime Complaint Center annual reports, not all states are equally shielded from cybercrime. In fact, the state with the highest rate of cybercrime attempts per capita is nearly 118% higher than you’d expect from a state with a similar population, according to Comparitech. Read on to discover what the FBI’s data…
-
85 Android Apps Outed as Adware in Disguise
Earlier this month, Japanese IT security company, Trend Micro, discovered a host of adware-fueled apps for download in the Google Play Store. In total, the security company identified 85 apps masquerading as entertainment apps like: Reports indicate that up to nine million users may have been infected by the adware with one app, ‘Easy Universal…
-
Why You Need to Know the Difference Between Data Exposure and Breaches
Year-over-year data breaches are an increasing cause for concern. From 2016 to 2018, data breaches increased by more than 50%. And while 2017 endured the highest number of breaches on record, the incidents in 2018 reached a larger scale and caused unprecedented concern due to the caliber of organizations affected. Most notably, the breaches that…
-
How an Increase of Passwords is Creating Increased Cyber Risk
Lock screens, email accounts, social media profiles, phone applications — the number of programs and tools we use rely on are grows every day. And, for each program, ideally, should be a unique password. According to Emmanuel Schalit, head of password security company Dashlane, the average consumer of digital technology has about 200 accounts that…
-
What To Do If You Think You’re a Victim of The Marriott Breach
Personal data of up to 500 million Starwood Hotel customers have been breached, thanks to a malware virus implemented in the hotel chain’s point-of-sale software in 2014. The hotel giant discovered the four-year-old vulnerability in mid-September when an internal security tool alerted the Marriott team someone was trying to access the Starwood guest reservation database.…
-
The Global Reaction to the ‘Paris Call for Trust and Security in Cyberspace’
Earlier this month, leaders gathered in Paris for the hundredth anniversary of the end of World War One. French President Emmanuel Macron took this time of gathering (as it also overlapped with the UNESCO Internet Governance Forum) to introduce a new initiative he’s been working on called the “Paris call for trust and security in…
-
How to Check if your Facebook Account was Hacked
What to do to Protect Yourself Now, and in the Future? Roughly one month ago, social media giant Facebook, announced a breach that may have impacted up to 50 million of their users. The company believes that attackers used the Facebook developer APIs to obtain user information commonly found in bios, like: The New York…
-
How to protect your cryptocurrency from theft
Since the dawn of cryptocurrency time, hackers and bad actors have found creative ways to steal or intercept cryptocurrency from its true owners. One of the most notable examples of this is the story of the now defunct bitcoin exchange company, Mt.Gox. The organization started in 2010 and quickly became one of the largest players…
-
4 ways to protect your family’s privacy online
In the modern day of cyber attacks and data breaches, it can be difficult for any one of us to maintain privacy online. Our most sensitive information ranging from family photos to intimate finance details are flowing onto the internet, and hackers and schemes are more sophisticated than ever. As if we don’t have enough…