If you use the iOS app for Tumblr, change your password now

Tumblr didn’t say it was hacked. They didn’t say that any data was lost nor did they say that that there is any reason for concern. They did, however, tell all iOS app users to download the new version with a “very important” security update. Oh, and they also told everyone to change their password… Continue reading If you use the iOS app for Tumblr, change your password now

How to easily protect your digital identity

Protecting your digital identity doesn’t take a degree in computer science. Follow these 5 easy steps to secure your personal information so no one can steal your identity without working really, really hard for it.   Keep your operating system updated You can set most operating systems to update themselves automatically. That’s a smart move… Continue reading How to easily protect your digital identity

Is social media privacy breached if it’s software that’s listening in?

Facebook and other social networks are employing keyword-sniffing programs that monitor our private communications such as chats and direct messages. When a potential criminal activity is found, the communication is presented to human auditors who determine whether or not to inform law enforcement. Is this a good thing or a bad thing? This was one… Continue reading Is social media privacy breached if it’s software that’s listening in?

Where is your POS system vulnerable?

When it comes to point-of-sale, there are a few vulnerabilities that you probably didn’t even know were there. In 2012, the retail industry made up 45 percent of data breach investigations, making it the highest percentage in retail history. E-Commerce sites were the most common target, accounting for 48 percent of all investigations and spanning 29… Continue reading Where is your POS system vulnerable?

Tips to protect your social media accounts

There are a few risks that come with social media. Few of them are very serious, but it is always a good idea to be cognizant of them to be on the safe side. Social media profiles are not often hacked unless they are popular or influential ones. If your social media profile is becoming… Continue reading Tips to protect your social media accounts

People care about Facebook privacy, just not enough to do anything about it

“Damn you, Facebook. I don’t like you but everyone I know is on it. If I want to see pictures of little Timmy sliding into third base or hear what’s happening with my ex-, I’ll have to keep playing your game.” Similar thoughts run through the minds of millions of people all the time. People… Continue reading People care about Facebook privacy, just not enough to do anything about it

The basics of online tracking

There are two sad realities about online tracking. One reality is that the majority of people have their online activities tracked on nearly every website that they visit and these tracking protocols have very little oversight, nearly no rules associated with them, and can be stored indefinitely by anyone, even sites or companies that you’ve… Continue reading The basics of online tracking

MyIDKey busts $150k on Kickstarter in 2 days

“Together we can solve this password problem now.” That’s the final line of the video that the team at myIDkey put together for Kickstarter. The video and the overall pitch itself worked nicely – it broke the $150,000 project requirements in only two days. Sitting at $177k now, the excitement surrounding security projects like these… Continue reading MyIDKey busts $150k on Kickstarter in 2 days

Duh. The easiest way to stop hackers is with real passwords.

One of the most personal online violations that can occur to anyone is getting hacked. It could be a personal attack such as a Facebook account, on which 600k successful hacks are achieved daily. It could be something more general such as a database hack that exposes personal information. It could be much, much worse.… Continue reading Duh. The easiest way to stop hackers is with real passwords.

The 10 most notorious hackers

While high-profile hacking made headlines in 2012, some of the most famous hack jobs took place years ago. The masterminds behind these notorious events are outlined below. Kevin Mitnick Labeled as the most wanted cyber criminal in United States history, Mitnick took down the dedicated servers of Motorola, Fujitsu and Nokia. After his 1995 arrest and five-year… Continue reading The 10 most notorious hackers