Tag: security

Is social media privacy breached if it’s software that’s listening in?

Is social media privacy breached if it’s software that’s listening in?

May 21, 2013

Facebook and other social networks are employing keyword-sniffing programs that monitor our private communications such as chats and direct messages....

Where is your POS system vulnerable?

Where is your POS system vulnerable?

May 10, 2013

When it comes to point-of-sale, there are a few vulnerabilities that you probably didn't even know were there. In 2012, the...

Tips to protect your social media accounts

Tips to protect your social media accounts

April 26, 2013

There are a few risks that come with social media. Few of them are very serious, but it is always...

People care about Facebook privacy, just not enough to do anything about it

People care about Facebook privacy, just not enough to do anything about it

April 21, 2013

"Damn you, Facebook. I don't like you but everyone I know is on it. If I want to see pictures...

The basics of online tracking

The basics of online tracking

March 10, 2013

There are two sad realities about online tracking. One reality is that the majority of people have their online activities...

MyIDKey busts $150k on Kickstarter in 2 days

MyIDKey busts $150k on Kickstarter in 2 days

November 18, 2022

"Together we can solve this password problem now." That's the final line of the video that the team at myIDkey...

Duh. The easiest way to stop hackers is with real passwords.

Duh. The easiest way to stop hackers is with real passwords.

February 10, 2013

One of the most personal online violations that can occur to anyone is getting hacked. It could be a personal...

The 10 most notorious hackers

The 10 most notorious hackers

January 3, 2013

While high-profile hacking made headlines in 2012, some of the most famous hack jobs took place years ago. The masterminds...

App security: how important is it?

App security: how important is it?

December 20, 2012

If you consider the amount of attempts to hack into government systems and databases, and how many times your personal...

Censorship on the internet: be your own watchdog

Censorship on the internet: be your own watchdog

November 18, 2022

There’s been a lot of focus, especially in the past year, on internet censorship. From the battle against online piracy...

Hacker group AntiSec leaks Apple device IDs to highlight FBI tracking

Hacker group AntiSec leaks Apple device IDs to highlight FBI tracking

September 4, 2012

If reports from the hacker group are to be believed, the FBI has over 12 million Unique Device Identifiers (UDIDs)...

Should two-factor authentication be utilized for all your accounts?

Should two-factor authentication be utilized for all your accounts?

November 18, 2022

The fear of hackers and privacy peeping toms has been quelled for the moment due to the unveiling of a...