Stop Saying Privacy Is Dead

Some dismiss privacy concerns by saying they have nothing to hide, we shouldn’t accept that argument from anyone wearing clothes. Or anyone who closes the bathroom door, locks her home or car, or uses password-protected accounts. …

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

Are you will to make changes to protect your privacy?

Join the conversation on our Facebook Page!

How hackers make money from your stolen medical data

The most expensive offering on the market is provider information which can be used to forge a medical background, an alarming prospect given the harm which could be done when someone who hasn’t qualified poses as a medical professional. … The cybersecurity firm also found a vast array of forgeries available and for sale. For between $10 and $120 per record, you can buy fake prescriptions, labels, sales receipts, and stolen healthcare cards.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Has your healthcare info been stolen? What was the result?

Join the conversation on our Facebook Page!

Will VPNs Become Obsolete In 2019?

If you just want your passwords and banking information to stay secure, then a VPN is already obsolete. HTTPS keeps your passwords and other information inaccessible for hackers by utilizing strong encryption, no VPN required. However, if you want privacy, you’ll need a VPN.

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

Do you use a VPN?

Join the conversation on our Facebook Page!

A Few Simple Steps to Vastly Increase Your Privacy Online – update

The short answer is that a VPN is a great way to increase your privacy. The only problem is that you are still ultimately putting your trust in the VPN provider that they are not logging your browsing, that they won’t sell your data…

Thetoolsweneed.com click the link to read the rest of the story.

How concerned are you about privacy?

Join the conversation on our Facebook Page!

All Intel chips open to new Spoiler attack: There is no quick fix

Researchers have discovered a new flaw affecting all Intel chips due to the way they carry out speculative execution for CPU performance gains.   Like the Spectre and Meltdown attacks revealed in January 2018, Spoiler also abuses speculative execution in Intel chips to leak secrets. …Daniel (Ahmad) Moghimi, one of the paper’s authors, told The Register he doubts Intel will be able to patch the issue in the memory subsystem within the next five years.

ZDNet.com click the link to read the rest of the story.

Do you use Intel chips?Join the conversation on our Facebook Page!

Here are the data brokers quietly buying and selling your personal information

You’ve probably never heard of many of the data firms registered under a new law, but they’ve heard a lot about you. A list, and tips for opting out.

FastCompany.com click the link to read the rest of the story.

Will you use this list to opt out?Join the conversation on our Facebook Page!

Chinese Digital Surveillance Secrets Revealed In Database Leak

Earlier this month, security researcher Victor Gevers found and disclosed an exposed database live-tracking the locations of about 2.6 million residents of Xinjiang, China, offering a window into what a digital surveillance state looks like in the 21st century. …

EFF.org click the link to read the rest of the story.

What can we do?Join the conversation on our Facebook Page!

Hackers using stolen passwords to access TurboTax returns

Let this be a lesson: Don’t reuse your passwords.

Hackers accessed tax return information stored with TurboTax using a stolen password from a third party, an Intuit spokesman said Monday.

The attack, earlier reported in Dark Reading, didn’t breach the internal systems at Intuit, which owns TurboTax. Instead, attackers took lists of passwords stolen from other services and used them to try to log in to TurboTax accounts, the spokesman said. There, valuable personal information, such as Social Security numbers, names and addresses, is stored in tax returns.

CNet.com click the link to read the rest of the story.

Do you still use the same passwords over and over?Join the conversation on our Facebook Page!

Use a Cisco router? Patch it now ! It’s a 9.8/10 Security hole

Cisco is warning businesses that use its wireless VPN and firewall routers to install updates immediately due to a critical flaw that remote attackers can exploit to break into a network.  The vulnerability allows any attacker with any browser to execute code of their choice via the web interface used for managing Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router.

ZDNet.com click the link to read the rest of the story.

Have you made sure yours is patched?Join the conversation on our Facebook Page!

There is no single solution to computer security

Anyone who regularly attends the Blackhat or Defcon conferences should understand that short of unplugging a computer system from its power source, it is not possible to rule out serious system and data compromise. There will never be any “silver bullets” to slay the security vulnerability werewolf.

Medium.com click the link to read the rest of the story.

How many layers of security do you have? Join the conversation on our Facebook Page!

Severe vulnerabilities uncovered in popular password managers

Passwords stored in RAM could lead to theft, but the report has to be considered in a risk-based context. …

Independent Security Evaluators (ISE) published an assessment on Tuesday which documented the results of tests involving 1Password, Dashlane, KeePass and LastPass, all of which are popular password managers available today.

ZDNet.com click the link to read the rest of the story.

Do you use a password manager?  Are you concerned?Join the conversation on our Facebook Page!

Why Online Privacy Matters and 5 Ways to Reclaim It

It’s the most common argument against privacy: “If you’ve got nothing to hide, you’ve got nothing to fear.” It’s also the silliest argument against privacy.

Privacy expert and author Daniel Solove has torn down this fallacy in his paper on the subject. But Solove’s essay is a complex take on a nuanced subject. Instead, the simple rhetoric of the “nothing to hide” argument is easier to repeat.

But no matter how little you have to hide, the implications of online privacy breaches are major. These few resources explain the pitfalls clearly and concisely.

MakeUseOf.com click the link to read the rest of the story.

What steps have you take to regain your online privacy?Join the conversation on our Facebook Page!

Simple changes that Minimize Risk While Surfing the Web on Your Phone

Here are a total of 10 simple and mostly free solutions to help you take better control of your mobile security. Take it slow, but by all means: Do take it. It’s worth the effort.

Medium.com click the link to read the rest of the story.

Have you taken the time to secure your phone?Join the conversation on our Facebook Page!

PC security warning: That out-of-date software is putting you at risk

Over half of applications installed on Windows PCs are out-of-date, potentially putting the security of users at risk through flaws in software that have already been patched by vendors. … running out-of-date software can provide an open door for hackers to take advantage of holes left in programs that haven’t had critical security updates applied….

ZDNet.com click the link to read the rest of the story.

How do you make sure your computer software is up to date?Join the conversation on our Facebook Page!

Configuring Your iPhone for Maximum Privacy and Security

In this article, it’s my goal to help you focus on security and privacy (two different but equally important matters) on the iPhone, specifically with regard to your phone’s data connection—the internet connection you use for surfing the web or using apps. … there is no such thing as perfect security or perfect privacy online, only best practices and best tools. Anyone who promises you otherwise is lying or ignorant….

betterhumans.coach.me click the link to read the rest of the story.

Which of his suggestions are you going to try first?Join the conversation on our Facebook Page!

Chinese Facial Recognition Will Take over the World in 2019

The best facial recognition startups are in China, by a long-shot. As their software is less biased, global adoption is occurring via their software. … A computer system that can track and identify any face anywhere is coming to global citizens. This is because capitalism isn’t regulated, it’s bullish on AI in an exaggerated sense where profits matter and efficiency fits the crime. As Chinese innovation start to get ahead, so too will Chinese ethics infiltrate the rest of the world. …

Medium.com click the link to read the rest of the story.

What should be done to protect our privacy?Join the conversation on our Facebook Page!

How Much is Your Privacy Worth To You?

The price for our privacy is surprisingly low.

This first hit me quite some years ago, while I was working with a very successful restaurant group. I was conducting an experiment in customer service…

Hackermoon.com click the link to read the rest of the story.

How much is your privacy worth?
Join the conversation on our Facebook Page!

How Amazon knows so much about you – and how to regain your privacy

If you are not happy with the amount of information Amazon holds about you, click through this gallery to find out what you can do to control how much of your private data it has.

ZDNet.com click the link to read the rest of the story.

Wish you knew simple ways to protect your online privacy?Join the conversation on our Facebook Page!

Five emerging cyber-threats to worry about in 2019

We’re going to see more mega-breaches and ransomware attacks in 2019. … But cyber-defenders should be paying attention to new threats, too.  Here are some that should be on watch lists:

Thanks to advances in artificial intelligence, it’s now possible to create fake video and audio messages that are incredibly difficult to distinguish from the real thing. These “deepfakes” could be a boon to hackers in a couple of ways. AI-generated “phishing” e-mails that aim to trick people into handing over passwords and other sensitive data have already been shown to be more effective than ones generated by humans. Now hackers will be able to throw highly realistic fake video and audio into the mix, either to reinforce instructions in a phishing e-mail or as a standalone tactic.

MITTechnologyReview.com click the link to read the rest of the story.

Are you taking security more seriously this year?Join the conversation on our Facebook Page!

Why you should switch to Signal or Telegram from WhatsApp, Today

WhatsApp and Facebook will start tracking everything you do on your phone to tailor ads to you. They will see your contacts list (which they already are, actually). This is a clear betrayal, for many users. But for some of us who are (kind of ) paranoid about security and privacy online, this was an obvious next step after Facebook’s acquisition of WhatsApp. So what should you do?…

Medium.com click the link to read the rest of the story.

Are you concerned about privacy?Join the conversation on our Facebook Page!

Why you should be using encrypted email

Email leads users to share highly sensitive information in a seemingly private way when, in reality, it’s everything but private. Case in point: see the image below and note a typical unassuming email containing a person’s credit card information. This may seem like a stupid mistake, but you’d be surprised at how common these type of emails get sent on a daily basis (I’m looking at you, mom). The only factor taken into consideration by the sender in these cases is that they trust the person on the receiving end. The problem here is…

Medium.com click the link to read the rest of the story.

Is your email secure? Are you certain?Join the conversation on our Facebook Page!

The People Who Pay For Your Free Apps

We’ve all started taking this free software for granted. Hell, I’ve watched people get indignant that an app maker would even dare ask a user to pay money. After all, all the other apps are free.
Except that they’re not. The programmers who made that software need to eat. Presumably, they eat, which means someone’s paying them. If it’s not you, then who?
If you aren’t paying to use the software you use, that means someone else is paying for you.

Medium.com  click the link to read the rest of the story.

How much do you think the average app earns from your using it? Would you rather pay?Join the conversation on our Facebook Page!

Passwords Might (Finally) Go Away Soon, Here is why

There’s hope that we can finally ditch long, complex passwords thanks to a series of regulations and open standards that ease and encourage the implementation of passwordless authentication methods in online applications.

“The vast number of passwords needed in our daily lives have become a burden, which is why we see so many reused or weak static credentials,” says Stina Ehrensvard, CEO and Founder of Yubico, which manufactures physical security keys like the Yubikey 5 NFC. “We needed to think about how to address this problem in a way that simplifies the login process while adding the highest level of security. Up until now, there hasn’t really been a way to do both of those things successfully.”

pcmag.com click the link to read the rest of the story.

Are you using or thinking of using a Yubikey?Join the conversation on our Facebook Page!

This is how online tracking works

Buzzwords like privacy, cookies, tracking, etc. are appearing on every news outlet that cares about the web. But they usually just scratch the surface, leaving a lot of the underlying machinery in the dark and still hidden away. … I’ll attempt to describe the different pieces that comprise online tracking, in a way that goes beyond the cookies and scripts.

unformated.space  click the link to read the rest of the story.

Was this helpful?Join the conversation on our Facebook Page!

How to Do Passwords Right in 2018

Modern-day browsers can not only save your passwords for you—they can recommend new, secure passwords whenever you need to create a new one, and can even warn you when you’re using the same password across multiple accounts.

gizmodo.com  click the link to read the rest of the story. Image via bitsfrombytes.com

Do you use a password manager?Join the conversation on our Facebook Page!

Don’t Let Big Tech Get Rich Off Your Info

More of your data is available for the taking than you might imagine. Here’s a primer on the best products for securing your digital privacy and tips for taking back control of your info.

 

pcmag.com click the link to read the rest of the story.

Have you tried to delete your online data?Join the conversation on our Facebook Page!

How Companies Turn Your Data Into Money

The best description of the data economy comes from AOL, of all places. The once-mighty internet service provider now runs a tidy business in the ad-exchange space. The site promoting the service is hip and tasteful, showing happy, partying people and white text that spells out things like “Monetize your most valuable asset” in all caps.  “A publisher’s audience is their currency,” the site says. “No matter how they make money from content—be it through advertising, paid subscription or syndication, a publisher’s core asset is audience and audience data.” This is weapons-grade marketing speak, but it’s also a surprisingly honest assessment of digital media’s beating heart—one that pumps out content and takes in reams of data from the people who consume that content. And somewhere, unseen, money is being made from what we see and do online.

pcmag.com click the link to read the rest of the story.

Do you use data targeting in your business?Join the conversation on our Facebook Page!

What is 2-Factor Authentication and Why Should You Care?

In the traditional flow, there is just 1 layer of security, that is your password. You enter your password and voila, you can access your account. But as stated above, this process is good but not great.   2-factor authentication (2FA) adds another security layer to the login process, reducing the chances of account hacking. In this, just knowing and entering your password is not enough. This new layer can be anything like an OTP sent to your mobile, an auto-generated code, or biometric verification on a device you own.

hackernoon.com click the link to read the rest of the story.

Do you use 2-factor authentication at work?Join the conversation on our Facebook Page!