As I get older, I am convinced that my memory is fading.  Whether it’s names, places or even passwords, my memory is just not what it used to be. In an effort to boost my neurological faculties, I decided to take tap dancing classes about 2 years ago. And while I am pleased to report […]

If I had asked you a decade ago how you’d feel about people knowing and tracking your everyday whereabouts, your response would have likely been that it’s an invasion of your privacy. Or, you would have at least been a bit wierded out. If I told you that trotting after your every move and handing […]

One Phish, Two Phish: How Cybercriminals Reel in 80% of Users with Deceptive Emails We’ve all seen it. The innocent-looking message from what appears to be your bank, reminding you that it’s time to update your account information with the simple click of a link and the entering of some personal information. Everything looks in […]

A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit would be a burglar breaking into your house. The burglar is dressed all in black, so that his form blends into the darkness. He tiptoes around to hide his sounds so he’s more likely to […]

Every dog has its day, and for data privacy that day is January 28, 2015. What the average person may consider just another Wednesday is an important day for those of us in the cybersecurity community. Data Privacy Day is the perfect reminder of the need to educate and safeguard both businesses and consumers alike. And […]