by Deveren Werne | Feb 22, 2019 | Computer Networking, Cybersecurity, Data Breaches, Home Security, Mobile Access Control, Network Security, Networking, News, Security, Security Breach, Technology News, Websites
Is Your VPN Leaking Your IP Address (Virtual Private Networks) are great for security, but one of the big reasons many people use one is to mask or change their IP address. Thus, one of the essential motivations to utilize a VPN is to conceal your actual IP address....
by Deveren Werne | Feb 21, 2019 | Computer Networking, Cybersecurity, Data Breaches, Network Security, Networking, News, Security, Security Breach, Technology News, Websites
A new study has identified security flaws in five of the most popular password managers. Now for some counter-intuitive advice: I still think you should use a password manager. So do the ethical hackers with Independent Security Evaluators who came to me with news of...
by Liquid Video Technologies | Jan 28, 2019 | Cybersecurity, Security, Security Breach
The US Department of Homeland Security (DHS) has issued an emergency directive tightening DNS security after a recent wave of domain hijacking attacks targeting government websites. Under the directive, which appeared a week after a US-CERT warning on the same topic,...
by Liquid Video Technologies | Jan 28, 2019 | Cybersecurity, Data Breaches
The best time to stop reusing old passwords was 10 years ago. The second best time is now. In one of the largest public data breaches, a collection containing more than 87 gigabytes of personal information was leaked online. The data dump, titled “Collection...
by Lance Roberts | Dec 30, 2016 | Cybersecurity, Network Security, Security
Cybercriminals are becoming more sophisticated and collaborative with every coming year. To combat the threat in 2017, information security professionals must understand these four global security threats. As with previous years, 2016 saw no shortage of data...
by Deveren Werne | Nov 4, 2016 | Cybersecurity, Data Breaches
The war between data defenders and data thieves has been described as a cat-and-mouse game. As soon as the white hats counter one form of black-hat malicious behavior, another malevolent form rears its ugly head. How can the playing field be tilted in favor of the...
Recent Comments