Category: Information
-
What To Do If You Think You’re a Victim of The Marriott Breach
Personal data of up to 500 million Starwood Hotel customers have been breached, thanks to a malware virus implemented in the hotel chain’s point-of-sale software in 2014. The hotel giant discovered the four-year-old vulnerability in mid-September when an internal security tool alerted the Marriott team someone was trying to access the Starwood guest reservation database.…
-
The Global Reaction to the ‘Paris Call for Trust and Security in Cyberspace’
Earlier this month, leaders gathered in Paris for the hundredth anniversary of the end of World War One. French President Emmanuel Macron took this time of gathering (as it also overlapped with the UNESCO Internet Governance Forum) to introduce a new initiative he’s been working on called the “Paris call for trust and security in…
-
How to Check if your Facebook Account was Hacked
What to do to Protect Yourself Now, and in the Future? Roughly one month ago, social media giant Facebook, announced a breach that may have impacted up to 50 million of their users. The company believes that attackers used the Facebook developer APIs to obtain user information commonly found in bios, like: The New York…
-
How to protect your cryptocurrency from theft
Since the dawn of cryptocurrency time, hackers and bad actors have found creative ways to steal or intercept cryptocurrency from its true owners. One of the most notable examples of this is the story of the now defunct bitcoin exchange company, Mt.Gox. The organization started in 2010 and quickly became one of the largest players…
-
4 ways to protect your family’s privacy online
In the modern day of cyber attacks and data breaches, it can be difficult for any one of us to maintain privacy online. Our most sensitive information ranging from family photos to intimate finance details are flowing onto the internet, and hackers and schemes are more sophisticated than ever. As if we don’t have enough…
-
How to defend yourself from the revival of cold boot attacks
Recent reports have shown a decade old hacking technique—the cold boot— is back. There are some notable differences from when the attack was first discovered to today’s version. What is a cold boot attack and are there preventative measures you can take to protect yourself? What is a Cold Boot Attack? In 2008, the Princeton…
-
Study Shows User Authentication Primary Cause of Medical Devices Breaches
As part of the “Post-Market Management of Cybersecurity in Medical Devices” written by the FDA, medical device vendors were encouraged to participate in a “threat sharing” program, where vendors report cyber vulnerabilities they’ve encountered. The findings are meant to help organizations learn more about the risks connected medical devices introduce to the health care system…
-
How Thieves Are Stealing Your Tax Return
We are in the midst of tax season. And, while we are busy collecting our w2s, 1099s and 1095s, identity thieves are equally busy scheming their next attack. Tax-related identity theft is when someone uses your Social Security number to file a tax return and fraudulently claim your refund. Tax refund fraud affects hundreds of…
-
How to Properly Define a Hacker
When you think of a hacker, the stereotypical image is often a male operating mysteriously in a darkened room. Technically, a hacker is a skilled computer expert who leverages their technical knowledge to overcome a problem. But, the more common definition is actually about a security hacker, or when someone uses their technical knowledge to deploy bugs…
-
Using Your Smartphone as a Mobile Hotspot, is it Secure?
For anywhere between $5 to $20 per month, depending on the provider, you can turn any park, coffee shop, beach, or bar into your office. All you need is a laptop and a smartphone with a tethering option. While many of us may consider this accessibility utopian, it can also be a surprising recipe for…