By now, you have probably heard about the Heartbleed bug, estimated to affect up to two-thirds of all websites using the OpenSSL encryption protocol to protect usernames, passwords, credit and debit card...
Spring cleaning isn’t just for the home. Each year it is a good idea for marketers to check in with their campaigns and shake off the dust in an effort to clean up rusty hinges and iron out the wrinkles.
As thought leaders at the largest dedicated security company in the world, we are tapped into all the hot cyber security topics at all times. So when we hear news about a breaking trend, like the Heartbleed vulnerability or the Target hack, we understand the issue and know how to respond. However, many average Americans […]
Data breaches are on the rise, according to a recent Pew Research study. This means that now, more than ever, our sensitive personal information is ending up in the hands of cybercriminals. The survey found that 18% of U.S. adults admitted to having sensitive information, like credit card and Social Security numbers, stolen at some […]
No, it’s not some new engineering field to develop social media sites. Social engineering has been around as long as the con artist has been around. The terms stems from the social science world where social engineering is deemed as an act of psychological manipulation. In our tech-laden world of today, social engineering still involves deceit but […]
One man’s trash is another man’s new identity? Yes, because that “junk mail” you toss in the garbage contains valuable data about yourself. A crook bent on identity theft can potentially have a field day with your discarded pre-approved credit card applications, bank statements, etc. Using a paper shredder before throwing out letters and documents […]
From a home security standpoint, the main gatekeeper is the house key. It’s small, portable and fairly adept at keeping out most would-be thieves. But the key does have a few things going against it: it can easily be stolen, lost or replicated; a talented lock picker can bypass it; and even the key won’t […]