security

Online Tracking

The basics of online tracking

There are two sad realities about online tracking. One reality is that the majority of people have their online activities tracked...
Avatar of JD Rucker JD Rucker
2 min read
MyIDKey

MyIDKey busts $150k on Kickstarter in 2 days

“Together we can solve this password problem now.” That’s the final line of the video that the team at myIDkey put...
Avatar of Lorie Wimble Lorie Wimble
25 sec read
Password

Duh. The easiest way to stop hackers is with real passwords.

One of the most personal online violations that can occur to anyone is getting hacked. It could be a personal attack...
Avatar of Greg Greg
33 sec read
Kevin Mitnick

The 10 most notorious hackers

While high-profile hacking made headlines in 2012, some of the most famous hack jobs took place years ago. The masterminds behind...
Avatar of Drew Hendricks Drew Hendricks
1 min read
Veracode Hacks 2012

App security: how important is it?

If you consider the amount of attempts to hack into government systems and databases, and how many times your personal information...
Avatar of Brian Wallace Brian Wallace
13 sec read

Censorship on the internet: be your own watchdog

There’s been a lot of focus, especially in the past year, on internet censorship. From the battle against online piracy to...
Avatar of Amanda Rush Amanda Rush
1 min read

Hacker group AntiSec leaks Apple device IDs to highlight FBI tracking

If reports from the hacker group are to be believed, the FBI has over 12 million Unique Device Identifiers (UDIDs) on...
Avatar of Connor Livingston Connor Livingston
45 sec read

Should two-factor authentication be utilized for all your accounts?

The fear of hackers and privacy peeping toms has been quelled for the moment due to the unveiling of a new...
Avatar of Nicholas DiCristo Nicholas DiCristo
1 min read

Hotel keycards can be easily hacked in 200 milliseconds

With less than $50 of store-bought hardware and some programming, a hacker can gain instantaneous and untraceable access into over four...
Avatar of JD Rucker JD Rucker
22 sec read

Top 5 security systems for 2012

Quiz time: Did you know that a burglary occurs every 14.6 seconds in America? With the average dollar loss from a...
Avatar of Drew Hendricks Drew Hendricks
2 min read

Small businesses must take preventative measures to safeguard against hackers

Hackers are becoming increasingly clever and conniving, while small businesses remain shockingly naive about the threat they face from cyber-attacks. This...
Avatar of Drew Hendricks Drew Hendricks
48 sec read

WiFi security facts and figures

WiFi has changed the world. We are no longer locked into proximity to wall outlets. We’re not tied down by physical...
Avatar of Rocco Penn Rocco Penn
27 sec read

The history of encryption

Sensitive data has always been a challenge to deliver securely. Even in the days of the Spartans, military commanders would use...
Avatar of Connor Livingston Connor Livingston
24 sec read

Will online shopping ever be safe?

As the madness of the holiday season dies down and the New Year gains pace, retailers will renew the cycle of...
Avatar of Sohail Qaisar Sohail Qaisar
2 min read

Worst IT security breaches debriefed

When the enemy is a moving target it’s often only possible to look at the past to try to predict the...
Avatar of JD Rucker JD Rucker
17 sec read

Microsoft finding success in “neighborhood watch” against botnets

While national and worldwide agencies wage a war against online crime through the criminal courts, Microsoft is finding success using civil...
Avatar of Sal McCloskey Sal McCloskey
1 min read