First “Heartbleed Attack” makes wave

In the past couple of weeks you’ve probably received emails, Facebook posts, or tweets warning about the Heartbleed virus, but have there actually been any victims? Supposedly, Heartbleed has a knack for stealing credit card information, usernames, and passwords, making it a particularly nasty virus. The news swept the globe, raising general anxiety, putting IT… Continue reading First “Heartbleed Attack” makes wave

Why the NSA tapping of Google and Yahoo clouds is more dangerous than PRISM

Could we be getting “NSA fatigue”? No, I’m not talking about the obvious weariness that we have about the National Security Agency’s actions. I’m talking about the news. Has there simply been so much that has come out about their activities over the past few months that blockbuster news doesn’t even grab our attention anymore?… Continue reading Why the NSA tapping of Google and Yahoo clouds is more dangerous than PRISM

Where is your POS system vulnerable?

When it comes to point-of-sale, there are a few vulnerabilities that you probably didn’t even know were there. In 2012, the retail industry made up 45 percent of data breach investigations, making it the highest percentage in retail history. E-Commerce sites were the most common target, accounting for 48 percent of all investigations and spanning 29… Continue reading Where is your POS system vulnerable?

Tips to protect your social media accounts

There are a few risks that come with social media. Few of them are very serious, but it is always a good idea to be cognizant of them to be on the safe side. Social media profiles are not often hacked unless they are popular or influential ones. If your social media profile is becoming… Continue reading Tips to protect your social media accounts

How social engineering works

When you combine the common old school methods of grifting with the technological advancements of hacking and social research, you have social engineering. In essence, it’s the art of taking advantage of people’s hopes, dreams, secrets, and all of the information that’s available on their computers, their social media profiles, and even when they’re simply… Continue reading How social engineering works

The facts about passwords

Do you know what the most common length of a password is? Or how long it takes a hacker to crack one of your most valuable codes? There are a lot of people who have fallen victim to cyber-crime, but there are many ways to prevent it from happening. Understanding the facts on why passwords… Continue reading The facts about passwords

Sony finally flips the switch on PSN, floods users with freebies, free games

Sony’s PSN service is slowly coming back to life, much to the enjoyment of those who have been without online access from those with PS3s for several weeks. It will take some time for everything to be back to normal, but until then, Sony is giving away a slew of free PSN items and two… Continue reading Sony finally flips the switch on PSN, floods users with freebies, free games

Sony: we are “uncertain” (have no clue) when PSN is coming back

Sony was threatened, credit card numbers were stolen, gamers were frustrated, and Sony still doesn’t have a clue about what is going on. And yet the train wreck — also known as Sony’s PSN service — continues to take its toll on gamers. So, if anyone out there was hopeful for a return of multiplayer… Continue reading Sony: we are “uncertain” (have no clue) when PSN is coming back

Hackers compromise Sony Online Entertainment, Sony shuts it down

Sony has been beaten up pretty badly lately, but this is kicking ’em while they’re down: hackers have compromised Sony Online Entertainment, which provide access to several online MMOs. Not only that, but hackers could have potentially stolen credit card data from those accounts as well. Sony is still investigating. Sony was quicker to respond… Continue reading Hackers compromise Sony Online Entertainment, Sony shuts it down