Privacy Comes To Largest Installed Browser Base.

Privacy Comes To Largest Installed Browser Base.

Privacy Comes To Largest Installed Browser Base. Mozilla is enhancing the privacy of its US-based Firefox browser applications with a new VPN privacy extension, this week. After downloading, they must sign in to their Firefox account and then click on the extension's...

Warning About Security of Cryptocurrency

Warning About Security of Cryptocurrency If you have listened to me for a while, you know how I feel about Cryptocurrencies, and it looks like I was right all along. It is fraught with fraud that prays on peoples hopes and dreams. The criminal activity of ransomware...

You Can Buy Anything In This World For Money

You Can Buy Anything In This World For Money

You Can Buy Anything In This World For Money You can buy anything in this world for money — nowhere is this statement truer than on the Dark Web. No matter what a cybercriminal is looking for with money someone in the dark web supply chain which is willing to provide...

Perils of Public WiFi and How To Protecting Your Information

Perils of Public WiFi and How To Protecting Your Information

Perils of Public WiFi and How To Protecting Your Information With the abundance of available public WiFi networks that are prompting us to connect whenever we sit down in a public area. Who pays for those WiFi routers, is it a profit point for the business by selling...

Major Cell Carrier Program Protects Customers from SimSwapping

Major Cell Carrier Program Protects Customers from SimSwapping

Major Cell Carrier Program Protects Customers from SimSwapping T-Mobile is taking action against the social engineering attack known as Sim Swapping. Using a non-advertised and rather private feature knowns as "NOPORT" to prevent the tricking of their customer service...

Enjoying Some Anonymity Maybe Not For Long

Enjoying Some Anonymity Maybe Not For Long

Enjoying Some Anonymity Maybe Not For LongWorldwide in research labs engineers are working on some scarily intrusive surveillance technology tools. But what happens once these technologies have completed the design and testing process — they must be sold and used....

HR The Gateway To Cybercrime

HR The Gateway To Cybercrime

HR The Gateway To Cybercrime   Today's cybercriminals are continually developing new and sophisticated techniques with which to gain access to their victim's internet technology systems. Currently, over 90% of all cybercrime involves a phishing email. We all have...

Algorithms Should be Fair — But they are not.

Algorithms Should be Fair — But they are not.

Algorithms Should be Fair -- But they are not.Kentucky lawmakers thought requiring that judges consult an algorithm when deciding whether to hold a defendant in jail before trial would make the state’s justice system cheaper and fairer by setting more people free....

Successful Cybercriminals Require Your Help

Successful Cybercriminals Require Your Help

Successful Cybercriminals Require Your HelpMost cybercriminals target people, not infrastructure: More than 99% of emails distributing malware from 2018 into 2019 required human interaction to click links, open documents, accept security warnings, or complete other...