Cyber criminals are not run-of-the-mill street hooligans. Assailants of online crimes are educated, tech-savvy, sophisticated individuals who don’t care if you prefer PC to Mac or vice versa. There has been considerable debate in the tech arena regarding the security of one machine over the other. Are PCs more prone to cyber attacks? Is a Macbook really less vulnerable to online threats? The debate wages on.
For a long time Mac users enjoyed a period of peace—they felt impervious to threats, only to realize years later that the sophisticated hacker would eventually evolve to this platform...
The security argument between Apple’s iOS and Google’s Android system for smartphones is heating up yet again. In a recent study conducted by Daniel R. Thomas, Alastair R. Beresford, and Andrew Rice at the University of Cambridge, research concluded that 90 percent of Android devices are exposed to at least one critical vulnerability.
The threat model was constructed using three common attack vectors: installation attack (malicious codes installed through app download); dynamic code loading (an existing app downloads new malicious codes); and injection (an attacker injects malicious code...
Thanksgiving not only marks the start of the fantastic holiday season—it’s also a time to reflect on what you’re thankful for. One of the many things to be thankful for this holiday is cybersecurity, which has gotten more and more advanced as of late.
Picture this. It’s Saturday morning and you’re hanging out at your local coffee shop using the free Wi-Fi to catch up on a few tasks you couldn’t quite get to during your busy week. Sound familiar? This is a typical scenario for many of us, but did you know you might be unaware of some threats lurking in the background on public Wi-Fi while you balance your bank account and sip a latte?
What Is Public Wi-Fi?
Public Wi-Fi can be found in popular public places like airports, coffee shops, malls, restaurants, and hotels — and it allows you to access the Internet for free. These “hotspots”...
Some 10 million identity thefts happen in the United States every year. Taking extra steps to protect your personal information—and knowing what information you need to safeguard—is the best way to prevent identity theft from happening to you. Let’s review this information to help you protect yourself as much as possible:
Among the information considered “low risk” in regard to personal information sensitivity is your full name, address, and phone number.
Information regarded as “medium” in terms of sensitivity includes your date of birth, place of bi...