Mobile devices have come a long way. We mean a reeeallly long way. In but a few short years they have gone from “nice to have but not so essential” gadgets to “OMG I can’t function without it” life savers. These chocolate bar-sized devices hold more information than most 3 year old desktop computers and glued to our sides day and night, they contain all … Continue reading Simple Tips to Spotting Evil Apps
Who doesn’t love a good fishing trip? Just imagine it – you, some cold ones, your boat sailing along in the middle of the placid silver-blue lake. But wait! What’s that grabbing hold of your line, tugging as if it’s the master and you’re the one getting caught? Well guess what? When it comes to phishing, you’re the one being reeled in. Phishing, which is … Continue reading One Phish, Two Phish, Red Phish…Spear Phish?
It’s been a full fifteen minutes since you last checked your Facebook account (oh, the self restraint!) and the part of your brain that allows your fingers to seamlessly, unconsciously hit that app on your smartphone does it again. There you are, mindlessly staring at your Facebook feed, when – Bam! “North Korea nuked Russia??” “Obama, in his last move of his presidency is granting … Continue reading Fake News Flash – Think Before you Share!
So by now, 2016 is just a mere memory and that means it’s time to make some predictions about what lies ahead in 2017 in the realm of cyber security. Last year, the convergence of tech, society and security were some of the central-most elements to define the year; There was the the Apple vs FBI showdown, the persistent ransomware crisis, and Russia’s involvement in … Continue reading 7 Bold Security Predictions for 2017
2016 has come and gone and now we can look back at the year that was and say with complete confidence that it truly was a watershed year for cyber security. Each day brought new reports of data breaches and threats of epic proportions — and every time we figured we had heard the last of it, more tales were just around the corner. And … Continue reading A is for Apple, B is for BitCoin – The Most Noteworthy Data Breaches of 2016