Cyber security blog

Could Your Workspace be Leaking out Corporate Data? Know the Real Score about Spy Monitoring

One of the most basic things you need to consider when doing business online is that the World Wide Web is an open arena with no established security. Once you have learned to appreciate that the internet is not a safe environment, your plans of action and decisions will be based on how to avoid or minimize vulnerabilities with your online tasks. This should especially be the mind set of people wh ... [Read more]

Think Your MAC is Safe? Learn These Insider Tips to Identify and Remove MacDefender Trojans

Macintosh is well-known for being safe, secure, and smooth-running. However, hackers and cyber spies are becoming more and more ingenuous in tapping into private networks and computers that even what once was the safest device has also been struck. ... [Read more]

What Security Companies Won’t Tell You: Pro Reveals Exclusive Scoop on Best Internet Security Practice

Most people think that tight security measures mean spending thousands upon thousands on high-tech gizmos. Some misleading companies may even lure you into buying their services by intimidating you with convoluted ideas concerning privacy online. What you may not know is that the secrets to building walls to keep spying parties out, the best practices to preserve backdoors from letting hackers in, ... [Read more]

Are You Well-Equipped Against Hackers? Know the Different Weapons of Computer Protection

People store up important information in their PCs but not many take measures to make sure it is well-guarded from spy monitoring. Computers are almost indispensable to work now but few protect their devices from viruses corrupting their work spaces.How do you know if your computer is equipped with the necessary tools to avoid, remedy, or revive it when viruses, worms, and other malicious malware ... [Read more]

How to Tell the Difference between Anti-Virus and Anti-Malware Tools

People are wiser nowadays when it comes to taking care of their computers. In fact, most computers come with software for protecting the device.Because there are different kinds of threats that can corrupt the computer and compromise its data, there are also different kinds of software or tools which can combat these malicious applications.It is one thing to download or install various tools to pr ... [Read more]

The Only Password Strategy You Need to Know

Managing different accounts online can be quite a daunting task. For one thing, people are now prone to log on online to do what traditionally are done personally such as paying bills, shopping, sending out messages to friends, booking appointments, among other tasks. For another, security is always an important issue when performing these tasks and therefore, correct management of the different r ... [Read more]

The Right to be forgotten: How a File Shredder Can Wipe out All Data You Want Gone

It has been said that nothing in the internet is lost forever. The price of living in the digital world is that deleting files from your computer or phone is not a permanent fix. Even if you have cleaned out your files and have gotten rid of all data you want gone, these files could still be retrieved somehow somewhere. Is destroying files permanently even possible then? What the common computer u ... [Read more]

Why Strong Firewalls are Not Enough: Debunking File Transfer Misconceptions

A typical business enterprise transfers thousands of files every day. Because this is an essential productivity tool, misconceptions abound as much as the practices associated to it. Could your file transfer concepts be nothing more than just myths? Here are the top three collated misconceptions debunked: ... [Read more]

Domain Security: Why You Need to Know About SEO Poisoning

Hacking is not only exclusive to obtaining private files and compromising networks. Cyber criminals have now found a way to take hacking to a whole new level, which is, targeting the SEO value of a domain. This kind of hacking may not be as well-known as the conventional one but it is indeed possible to cheat the system and benefit from another person’s hard work in bringing raw traffic to a dom ... [Read more]

Experts Release Comprehensive Business Cyber Security Plan

Business owners should not depend on luck or precautions to keep their services safe. Experts agree that every business should have a strategic plan to implement and ensure cyber security. This includes a planned out approach to safeguard the existing systems of a business and protect all information moving forward. The Federal Communications Commission has in fact set up Small Biz Cyber Planner w ... [Read more]

Security for E-Commerce: Every Business Person’s Guide to Customer Protection

If you are running a business online, you know that trust is an essential foundation of your trade. It is the element that can make or break your customer relations and ultimately, the stability of your business. When customers purchase your products online, they entrust their personal information to your care in exchange for your service. With this importance in mind, every business should only r ... [Read more]

Phishing Emails: Recognize and Keep Malicious Emails at Bay

Cybercriminals or hackers target the personal information of their victims by sending out emails. Otherwise known as a phishing scam, this tactic aims to fraudulently obtain and use personal information such as Social Security Number, credit card information, and other bank details.Here are the common characteristics of a phishing email: ... [Read more]

How to Use Apple's iCloud Keychain

The latest update to the Mac OS and iOS included a new feature called “iCloud Keychain.” In a nutshell, Keychain allows you to securely store account information like user IDs and passwords, along with other secure data, such as credit card numbers. On top of that, Keychain integrates seamlessly with Safari and, if you’re trying to come up with a new password, Keychain will automatically su ... [Read more]

Is Your Password Really Protecting You?

The definition of “pwned,” according to the online UrbanDictionary, is “to be dominated by an opponent or situation.” Telling someone they’ve been “pwned” or “owned” after an account has been hacked is also common lingo in the Internet security business. Despite instructing people for years now that they need to change their passwords every six months, make their passwords strong ... [Read more]

The Future of Passwords

It seems to be the general consensus these days that passwords as we know them are on the way out. As far back as November of last year, Wired’s Mat Honan declared that, “The age of the password is over, we just haven’t realized it yet,” in a piece entitled, “Kill the Password: Why a String of Characters Can’t Protect Us Anymore” (which also does a great job of enumerating why passwo ... [Read more]

25 Worst Passwords of 2012

In 2012, you’d hope the majority of people now know to stay away from common and easily hackable passwords, but with new research from SplashData we unfortunately find this is not the case. Amazingly, “password” still ranks as the number one most common password hackers find effective at breaching accounts, followed by “123456,” and some other passwords I bet you can guess. ... [Read more]

Majority of People and Businesses are Cybercrime Victims [Infographic]

A new survey performed by the Ponemon Institute shows that both businesses and private computer users frequently deal with security issues from hackers and other malicious attackers.The research institution surveyed IT departments and IT security practitioners in the United States, France, Germany and the UK. A shocking 90 percent of U.S. businesses said that their organizations’ computers were ... [Read more]

QuickLock App Screen Locks Your Mac

/image/quicklock.jpeg ... [Read more]

Why Cybersecurity Is Scary [Infographic]

Are you paying enough attention to online security?If you’re like most computer users, probably not. Trend Micro, a security software producer, performed some research to see how people view online security. What they found is no surprise — Internet users don’t protect their passwords sufficiently, for instance — but the extent of users’ lax attitudes towards cybersecurity is quite surpr ... [Read more]

Using Your Smartphone for Work? That’s Risky for Your Company

Many companies allow employees to bring smartphones, tablets and other personal devices to work with them. According to a new survey from IT risk & compliance company Coalfire, employers might be putting their businesses at risk with casual bring-your-own-device (BYOD) policies.“The weekly hype about data breaches and different companies being compromised is astounding,” Mike Weber, the Managi ... [Read more]

Dropbox Adds Two-Step Verification to All Accounts

Dropbox users can now take advantage of a secure two-step verification process to protect their accounts from unauthorized access. The process requires a cell phone and should help to prevent identity thieves from accessing sensitive files through the site.Dropbox is a large cloud-based file sharing and storage service. ... [Read more]

38% of People Would Rather Clean a Toilet Than Create a New Password

A new poll shows that people don’t really enjoy thinking of new passwords for their favorite websites. It’s not surprising information until you consider the tasks that respondents preferred over a quick update on a login screen.38 percent of participants in a poll from Harris Interactive indicated that they would rather handle household chores–including cleaning toilets and doing the laund ... [Read more]

The 20 Most Common ATM PINs: Is Yours Leaving You Vulnerable?

You’re probably aware of the importance of selecting a strong password, but you might not realize that you need to exercise similar care when choosing your PIN number. A new analysis shows that many people choose extremely simple PIN numbers for their ATM cards, potentially putting their savings and checking accounts at serious risk. ... [Read more]