Blog

How to beef up your iPhone passcode

Now that at least two companies are selling devices that unlock protected iPhones, it’s time for you to update your passcode to a stronger one and avoid the risk of unwanted access. Here’s how. The problem According to reports, at least two companies, Israel-based technology vendor Cellebrite and Atlanta-based Grayshift, have both developed relatively inexpensive […]

Read more

What is Dark Web Monitoring And Why Does Your Business Need It?

Do you know anything about the dark web? The dark web is an area of the internet that’s overlayed by different networks, so it’s only available through certain browsers such as Tor. The dark web makes up a small fraction of internet use, but it’s not something you want to visit.

Read more

4 Examples of Phishing Scams (And How to Avoid Them)

Anyone can become a victim of identity theft. Many people would assume that elderly people are more at risk, but it’s been shown that tech-savvy people are 18 times more likely to fall prey to phishing scams. When you throw in phishing threats, the numbers on identity theft rises.

Read more

Browser-Based Biometrics Boosts Security

Earlier this month, the World Wide Web Consortium, announced plans to begin allowing users to log into online accounts with fingerprints, facial scans, and voice recognition. This will not only boost security, but also make account management much simpler.

Read more

How to boost your mobile hotspot

Creating a mobile hotspot allows people to connect to the Internet whether or not their location has Wi-Fi. All they have to do is activate a portable 4G router to generate a private wireless network for their devices to link to. Business owners who invest in these low-cost devices enjoy extraordinary improvements in employee productivity… […]

Read more

5 tips on keeping mobile workers connected

Due to increasing connectivity and technological advances, mobile workers are increasingly becoming the norm in almost every industry. Business owners need to ensure these workers stay connected, so we’ve got some helpful tips in how to effectively apply mobile performance management.

Read more

April Data Breach News

It’s the little things that give you away. This past week brought us a diverse set of incidents. Unfortunately, several of the high-profile compromises could have been easily prevented. From database misconfigurations to Phishing exploits, this week was the busiest week in disclosure since the week of March 19th.

Read more

Is your Android phone really up to date?

To fend off the latest cyberattacks, Android phone manufacturers claim they always stay on top of bug fixes and security patches. But in light of recent reports, you may not want to take their word for it. Researchers say some popular Android vendors have missed quite a few important patches.

Read more

Facebook

The ability to harvest data on billions of Facebook users is not big news, You don’t need a Facebook API to scrape and profile most of its users. Profiles set to “public” have been harvested for years, and 3rd party data aggregators have built mountainous datasets on each and every one of these profiles. Data aggregators like Spokeo, Intellius, etc have done this for years.

Read more