• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Search

Search results

Data Privacy Day 2015

What is Data Privacy Day? Launched January 28th 2008 as an extension of Europe’s Data Protection Day celebration, Data Privacy Day (DpD) aims to empower and educate consumers and businesses about the importance of data privacy and the affect of their digi ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
27-Jan-2015 | 10:35AM
Comments:
2
Kudos:
4

What to Do in the Event of a Major Data Breach

Stories of massive corporate data breaches in the media are becoming all too common today. So common that the FBI now considers cyber attacks on US companies one of its top law enforcement priorities. Unfortunately, as technology progresses and all of our ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
05-Feb-2015 | 5:33PM
Kudos:
2

Data Privacy and Ridesharing Apps

In busy towns and congested cities, ridesharing apps are quickly becoming all the rage. They’re a new and interesting marriage of technology and commuting that helps us keep up with this “always on” lifestyle. However, they’re also kicking up quite the co ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
03-Mar-2015 | 11:26AM
Kudos:
2

Data Breaches Aren't Going Away- What You Need To Know

It may seem like stories of massive data breaches are popping up in the news on a weekly basis these days. Unfortunately, this is not surprising. As technology progresses, all of our information moves to the digital world, and, as a result, cyber attacks ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
05-Jun-2015 | 1:23PM
Comments:
2
Kudos:
2

New Vulnerability in OpenSSL Could Allow Attackers to Intercept Secure Communications

A new weakness in OpenSSL could allow attackers to hijack secure communications by tricking a targeted computer into accepting invalid and untrusted SSL certificates as valid certificates. This could help facilitate man-in-the-middle (MITM) attacks, where ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
09-Jul-2015 | 4:36PM
Kudos:
2

Just Because It's Posted on the Internet Doesn't Mean It's True

You may have seen one of those posts floating around on your newsfeeds recently, about Facebook charging you to keep your private information private. The post looks something akin to this: However, the truth of the matter lies in Facebook’s Privacy Polic ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
29-Sep-2015 | 12:51PM
Kudos:
2

Bug in Apple’s iOS and OSX AirDrop Could Allow Malware to be Installed Silently

A vulnerability in Apple’s AirDrop feature has been discovered by Australian security researcher Mark Dowd.  AirDrop is an “over-the-air” file sharing service that uses Bluetooth and WiFi, and is built into iOS and Mac OS X products. AirDrop automatically ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
16-Sep-2015 | 12:59PM
Kudos:
0

Apple’s iOS 9 Shines The Spotlight On Security

It’s another year and another shiny new iOS for all to enjoy! Apple hits the mark on all the usual exciting, fun enhancements such as a more intelligent Siri, and those new Emojis we’ve all been waiting for. However, after a few privacy mishaps last year, ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
14-Sep-2015 | 4:25PM
Kudos:
0

Thanksgiving- Cybersecurity Technologies We're Thankful for and Why

Thanksgiving not only marks the start of the fantastic holiday season—it’s also a time to reflect on what you’re thankful for. One of the many things to be thankful for this holiday is cybersecurity, which has gotten more and more advanced as of late. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
24-Nov-2015 | 8:00AM
Kudos:
2

Encryption: How To Utilize it Online and Why It’s Important

Encryption is the process of protecting personal data, often with a form of “secret code,” so that it cannot be read by anyone who doesn’t have the code key.  Today, huge amounts of personal information are managed online, via computer applications, and s ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
02-Nov-2015 | 9:42AM
Kudos:
1

Why Smartphones and Tablets Need Security Software

Português Español You install Internet security software on your computer, but what about your smartphone or tablet? If you think the mobile devices don’t require security software, well, you’d be wrong. Treating your smartphone or tablet in the same mann ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
05-Nov-2015 | 1:41PM
Comments:
1
Kudos:
2

Sneaky Android Adware Variant Tricks Users Into Thinking a Different App is Malware

A new, sneaky variant of Android.Mobilespy has been discovered. This malware steals information, and displays advertisements, however it executes it in a different way than most malware. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
01-Dec-2015 | 3:10PM
Kudos:
1

Up To 5 Million VTech User Accounts of Parents and Children May Have Been Compromised in Data Breach

This week, VTech, a global company that manufactures Internet connected learning products for young children announced that they have been involved in a massive data breach. The company’s learning devices, such as a smartwatch and smartphone, allow kids t ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
01-Dec-2015 | 2:13PM
Kudos:
1

Some Dell Computers Found Vulnerable to Man-in-the-middle Attacks Due to Root Certificate Vulnerability

It has been recently discovered that some Dell computers are vulnerable to man-in-the-middle attacks because of an issue with a root certification authority.  ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
24-Nov-2015 | 3:47PM
Kudos:
2

What Is Malvertising?

Malvertising is a shortened term for malicious advertising, and is defined as using online advertising to spread malware. Malvertising requires placing malware-laden advertisements on legitimate web pages and through authentic online advertising networks ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
18-Nov-2015 | 2:27PM
Kudos:
1

Kirby the North Pole IT Elf Presents: Paper or Plastic

Our favorite holiday IT elf is back with some more holiday shopping tips! This week he reviews "paper or plastic," and we're not talking about grocery bags.  ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
08-Dec-2015 | 9:00AM
Kudos:
0

Ransomware And The Importance Of Backing Up

Ransomware has a unique and specific agenda, and one that can be entirely avoided if properly understood. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
16-Dec-2015 | 10:00AM
Kudos:
5

A Cold Calling Scammer- a Personal Experience

I was sitting in my home office when my home phone line rang. It was late. 10:30pm to be exact, but I often use this quiet time, after my kids have gone to bed, to catch up on email. ...
Blog Post
Author:
gerry_egan Employee
Posted:
09-Dec-2015 | 2:37PM
Comments:
3
Kudos:
3

Data Privacy Day 2016: Ten Ways to Keep Your Data Private

The Internet has blurred the lines between real world and the virtual one. Technology is barreling into our hands through smartphones at an unbelievable pace. While this is good for productivity and progress, it makes it easy for thieves to do their job. ...
Blog Post
Author:
Posted:
27-Jan-2016 | 11:59PM
Kudos:
1

PC or Mac: Which Is More Resistant to Cyber Threats?

Português Español Cyber criminals are not run-of-the-mill street hooligans. Assailants of online crimes are educated, tech-savvy, sophisticated individuals who don’t care if you prefer PC to Mac or vice versa. There has been considerable debate in the tec ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
26-Jan-2016 | 6:00PM
Kudos:
1

Your Identity Is Connected to All of Your Devices. Here's How to Protect It.

You don’t have to be a super geek to protect yourself from cyber criminals and hackers. Sure they might know more about computers and software than you do. However, there are basic defenses available to help you stand up against even the most sophisticate ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
25-Jan-2016 | 6:00PM
Kudos:
2

Credit Monitoring Services and Other Anti-Fraud Protection

Identity theft is the most common complaint lodged with the Federal Trade Commission, to the tune of 11.7 million a year. That means roughly one-in-five Americans over the age of 16 have become victims of identity theft. 14 percent of those victims experi ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
21-Jan-2016 | 3:07PM
Comments:
1
Kudos:
1

iOS Device Users Should Update to 9.2.1 Now!

iOS device users- update your software now! Apple released an update to iOS 9 this week, which fixes a three-year old cookie theft bug. Cookies are small files that contain various types of data that remember a user, and are placed on your computer or mob ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
21-Jan-2016 | 6:30PM
Comments:
1
Kudos:
0

Cyber Security Top Tips for 2016

2015 was a banner year for cybercriminals. We reported on 53 events that made it into the headlines, however that was just what we reported. There were many more than that occurred. We took a look at what was trending to try to predict the next “big thing ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
20-Jan-2016 | 3:57PM
Comments:
6
Kudos:
2

Thousands of Websites Have Been Compromised With Malicious Code

Symantec has recently identified thousands of websites that have been compromised with malicious code, which is used to redirect users to a compromised website. Of the compromised websites, 75 percent were located in the U.S. An injection attack relies on ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
22-Jan-2016 | 3:49PM
Comments:
2
Kudos:
0

6 Tips To Maintain Your Privacy While Searching For Jobs Online

Looking for employment today is dramatically different from how it was just two decades ago. It’s rare to just walk into a business, fill out an application, and get hired within the same day; today’s job hunt often begins and ends online. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
19-Jan-2016 | 8:46AM
Kudos:
0

What to Do When a Device Is Lost or Stolen

Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging as it may be, you must remain calm so you can take the necessary steps to retrieve the device, or at least keep your data protected. You ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
24-Feb-2016 | 6:46PM
Comments:
1
Kudos:
1

Protecting Android Devices and Why They’re so Vulnerable

The security argument between Apple’s iOS and Google’s Android system for smartphones is heating up yet again. In a recent study conducted by Daniel R. Thomas, Alastair R. Beresford, and Andrew Rice at the University of Cambridge, research concluded that ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
22-Feb-2016 | 3:00PM
Kudos:
1

Participating in Legitimate Surveys- What Personal Data is OK to Give Away

Companies of all sizes use online surveys to gather important market research, which they later utilize to direct product development and marketing initiatives. This critical step in the marketing process is appealing to some online users because they get ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
17-Feb-2016 | 11:25AM
Kudos:
0

How to Remove GPS and Other Metadata Locations From Photos

Once upon a time, a photograph provided only the information one could see in the physical print—no hidden data about locations, time and date, or the device that took the photo.  With the advent of easy digital photography, however, connecting extra info ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
16-Feb-2016 | 2:40PM
Comments:
1
Kudos:
1