Convenience Gadgets – Design, Functionality then Security

Convenience Gadgets – Design, Functionality then Security

Convenience Gadgets – Design, Functionality then Security   The first half of this year has been marked with a rampant increase on all those little gadget devices known by the acronym, IoT. These are any small device or controller that is network connected....
New Tools Keep CyberThieves From Disabling Your Cyber Protections

New Tools Keep CyberThieves From Disabling Your Cyber Protections

New Tools Keep CyberThieves From Disabling Your Cyber Protections   Cybercriminals are continually working to defeat any cybersecurity protections we can think up, and it happens almost as fast as we make them. Many times the malware they create has one purpose,...
Standing our Ground on Encryption – without it, we will lose all Privacy!

Standing our Ground on Encryption – without it, we will lose all Privacy!

Standing our Ground on Encryption – without it, we will lose all Privacy!   According to the US Consitution, we have the right to be secure in our persons, houses, and papers. Unlike 1787 when they wrote the constitution, today, “our papers” are digitally...
Popular Game Breaches Personally Identifiable Information of 218 Million People

Popular Game Breaches Personally Identifiable Information of 218 Million People

Popular Game Breaches Personally Identifiable Information of 218 Million People   Do you like to play games on your smartphone or tablet? Word games, crosswords, and word searches and other social brain challenge games are quite popular but none so much as Words...
Spearphishing Mobile Devices of Executives

Spearphishing Mobile Devices of Executives

Spearphishing Mobile Devices of Executives   Many businesses today use mobile technology as a primary executive communication channel. However, what happens if these devices are lost or stolen. That often is when they find the executives becoming targets of...
Malcare WordPress Security