EZPD Blog Posts
-
How to Check if your Facebook Account was Hacked
What to do to Protect Yourself Now, and in the Future? Roughly one month ago, social media giant Facebook, announced a breach that may have impacted up to 50 million of their users. The company believes that attackers used the Facebook developer APIs to obtain user information commonly found in bios, like: The New York…
-
How to protect your cryptocurrency from theft
Since the dawn of cryptocurrency time, hackers and bad actors have found creative ways to steal or intercept cryptocurrency from its true owners. One of the most notable examples of this is the story of the now defunct bitcoin exchange company, Mt.Gox. The organization started in 2010 and quickly became one of the largest players…
-
4 ways to protect your family’s privacy online
In the modern day of cyber attacks and data breaches, it can be difficult for any one of us to maintain privacy online. Our most sensitive information ranging from family photos to intimate finance details are flowing onto the internet, and hackers and schemes are more sophisticated than ever. As if we don’t have enough…
-
What we Know About Global Password Security
Each year, LastPass conducts a survey that examines the state of global password security. In 2018, the company polled 43,000 businesses across the globe to check in on the health of organizations based on their password creation policies. The study considered the following: Each company polled was given a score on a scale of 0-100,…
-
SB 327 May Require Stronger Passwords on IoT Devices
You may recall in October 2016 when the Mirai botnet disrupted the internet. The DDoS attack made major Internet platforms and services unavailable to large swathes of users in Europe and North America. The botnet was able to have this control by taking advantage of connected devices that were protected by factory-default usernames and passwords…
-
How to defend yourself from the revival of cold boot attacks
Recent reports have shown a decade old hacking technique—the cold boot— is back. There are some notable differences from when the attack was first discovered to today’s version. What is a cold boot attack and are there preventative measures you can take to protect yourself? What is a Cold Boot Attack? In 2008, the Princeton…
Any questions?