Stop Saying Privacy Is Dead

Some dismiss privacy concerns by saying they have nothing to hide, we shouldn’t accept that argument from anyone wearing clothes. Or anyone who closes the bathroom door, locks her home or car, or uses password-protected accounts. …

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

Are you will to make changes to protect your privacy?

Join the conversation on our Facebook Page!

What is cyberwar? Everything you need to know about the frightening future of digital conflict

Cyberwarfare could turn every gadget you own into a weapon on a virtual battlefield. And the damage will be felt in the real world.  Cyberwarfare refers to the use of digital attacks — like computer viruses and hacking — by one country to disrupt the vital computer systems of another, with the aim of creating damage, death and destruction. Future wars will see hackers using computer code to attack an enemy’s infrastructure, fighting alongside troops using conventional weapons like guns and missiles.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are we ready for an all out cyber war?

Join the conversation on our Facebook Page!

Wi-Fi 6: Amazingly fast internet is coming — what you need to know

Wi-Fi 6 will improve the efficiency of a single network by about four times, … A larger benefit, however, is revealed when there are multiple devices connected to the same network. … all connected devices should see significantly less battery drain. … There aren’t a lot of router options on the market yet… [the first wifi6 routers are expensive, but as always the prices will drop, eventually].

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Will you be upgrading soon?

Join the conversation on our Facebook Page!

Will VPNs Become Obsolete In 2019?

If you just want your passwords and banking information to stay secure, then a VPN is already obsolete. HTTPS keeps your passwords and other information inaccessible for hackers by utilizing strong encryption, no VPN required. However, if you want privacy, you’ll need a VPN.

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

Do you use a VPN?

Join the conversation on our Facebook Page!

The End of App Stores Is Fast Approaching

A new generation of Progressive Web Applications (PWAs), now taking root on desktop computers, may soon make the jump to your smartphone, changing how you download apps — and where they come from — forever.

Onezero.Medium.com click the link to read the rest of the story.

Is it time for the end of the app store?

Join the conversation on our Facebook Page!

Major Antivirus companies secrets being sold on dark web

A collective of Russian and English-speaking hackers are actively marketing the spoils of data breaches at three US-based antivirus software vendors. The collective, calling itself “Fxmsp,” is selling both source code and network access to the companies for $300,000 and is providing samples that show strong evidence of the validity of its claims. …

Arstechnica.com click the link to read the rest of the story. Our FREE Tools can help!

How much trust do you have in your Antivirus program to protect you?

Join the conversation on our Facebook Page!

Walmart and Google forge alliance to battle Amazon

Google and Walmart have joined forces on voice-based shopping. The news comes on the heels of aggressive price cuts at Amazon-owned Whole Foods.

It’s not the first time Walmart has partnered with Google…. But now, with Amazon taking square aim at Walmart and other grocery chains in its bid to become a one-stop shop for all human consumption, voice-based shopping has become a matter of survival for brands like Amazon.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Where do you see this war ending?

Join the conversation on our Facebook Page!

Phishing Attacks Are Prevalent During March Madness

With popular sporting events like March Madness, it’s easy for attackers to prey on human emotions with excitement running high and money on the line. With so many employees participating in office pools and brackets, it’s critical to avoid getting phished through fake sporting-themed websites, contests and offers around the games, or malicious browser extensions that claim to keep track of scores and stats.

SecurityBoulevard.com click the link to read the rest of the story. Our FREE Tools can help!

Has your company been hit with this attack?

Join the conversation on our Facebook Page!

You Need Multiple Layers of Security

The findings in the Identity Theft Resource Center (ITRC)’s “2018 End-of-Year Data Breach Report” serve as a stark reminder of why companies should take a layered approach to security.

SecurityIntelligence.com click the link to read the rest of the story.

How many layers of security do you have?

Join the conversation on our Facebook Page!

A Few Simple Steps to Vastly Increase Your Privacy Online – update

The short answer is that a VPN is a great way to increase your privacy. The only problem is that you are still ultimately putting your trust in the VPN provider that they are not logging your browsing, that they won’t sell your data…

Thetoolsweneed.com click the link to read the rest of the story.

How concerned are you about privacy?

Join the conversation on our Facebook Page!

Cybersecurity is broken: Here’s how we start to fix it

We are building our future on a creaking digital foundation. It’s time for that to change. Cybersecurity is in a terrible state, possibly the worst it’s ever been. Literally not a day goes by without another report of a security breach or a data spill or a hack spilling corporate secrets.

This to me is the way to turn the tide. First, we need to value our own personal data more. …

ZDnet.com click the link to read the rest of the story.

What do you think we should do?
Join the conversation on our Facebook Page!

Reviewing Everykey – No More Passwords No More Keys

John McAfee has a solution for those that hate passwords and know they need more secure ones.  McAfee’s solution?  It’s called Everykey and it promises to eliminate the need of passwords on your computer, websites but also your car, front-door, etc.  Everykey was launched in 2014 and it received mixed reviews at the time.  But now 5 years later they have released a new version of the firmware and Ingenious Geeks have begun to  test it here for you.  So far, it is impressive!  We have hit a few bumps in the road but it can do some amazing things.

Have you tried the updated version of the Everykey? If so, please let us know your experience.  Ours has been very positive, thus far.  Check back, we will be releasing a full review.


Everykey.com click the link to read the rest of the story.

Do you have a unique password for all of your internet accounts?

Join the conversation on our Facebook Page!

Hackers using stolen passwords to access TurboTax returns

Let this be a lesson: Don’t reuse your passwords.

Hackers accessed tax return information stored with TurboTax using a stolen password from a third party, an Intuit spokesman said Monday.

The attack, earlier reported in Dark Reading, didn’t breach the internal systems at Intuit, which owns TurboTax. Instead, attackers took lists of passwords stolen from other services and used them to try to log in to TurboTax accounts, the spokesman said. There, valuable personal information, such as Social Security numbers, names and addresses, is stored in tax returns.

CNet.com click the link to read the rest of the story.

Do you still use the same passwords over and over?Join the conversation on our Facebook Page!

Microsoft security chief: IE is not a browser, so stop using it

Is Internet Explorer (IE) a browser? According to Microsoft, no. Today, it’s a ‘compatibility solution’ for enterprise customers to deal with legacy sites that should be updated for modern browsers.  … Chris Jackson, Microsoft’s worldwide lead for cyber-security, … that habit needs to stop … ‘The perils of using Internet Explorer as your default browser’.

ZDNet.com click the link to read the rest of the story.

Are you still using IE because it’s cheaper?Join the conversation on our Facebook Page!

New Google Chrome Add-On Warns When Your Password Isn’t Private

If someone else has used the same password as you and it’s listed in a dump, guess what? Your own account is also at risk. It doesn’t even matter if you used that password on a different website. Once it’s exposed, it’s just not safe to use any more.

With leaks and hacks happening more or less non-stop it’s a difficult task to keep your accounts secure.

Forbes.com click the link to read the rest of the story.

Did you know how easy it was to have a risky password?Join the conversation on our Facebook Page!

Microsoft: its time for Internet Explorer 10 Rest In Peace

Microsoft is giving commercial customers until January 2020 to transition to IE 11.  “After this, we will not release any security or non-security updates, free or paid assisted support options, or online technical content changes for IE10,” Microsoft says.

ZDNet.com click the link to read the rest of the story.

Is your office still using Internet Explorer?Join the conversation on our Facebook Page!

Simple changes that Minimize Risk While Surfing the Web on Your Phone

Here are a total of 10 simple and mostly free solutions to help you take better control of your mobile security. Take it slow, but by all means: Do take it. It’s worth the effort.

Medium.com click the link to read the rest of the story.

Have you taken the time to secure your phone?Join the conversation on our Facebook Page!

WordPress sites under attack via zero-day in abandoned plugin

WordPress site owners using the “Total Donations” plugin are advised to delete the plugin from their servers… This affects all versions of Total Donations, a commercial plugin that site owners have bought from CodeCanyon over the past years, and have used to gather and manage donations from their respective user-bases.

ZDNet.com click the link to read the rest of the story.

Were you using it?Join the conversation on our Facebook Page!

 

Security researchers take down 100,000 malware sites last year

Over the last ten months, security researchers filed abuse reports with web hosting providers and have taken down nearly 100,000 URLs that were used to distribute malware … the organization noted that recent numbers indicate that the average take-down time has now increased to more than a week, to 8 days, 10 hours, and 24 minutes, giving malware authors more than enough time to infect thousands of device every day. …

ZDNet.com click the link to read the rest of the story.

How much damage could this cause your customers if your site were infected?Join the conversation on our Facebook Page!

Excited about Google’s new map ads? You should be!

As an avid Google Maps user on both a personal and business level, I’ve often wished for a more interactive and all-inclusive experience. For instance, wouldn’t it be great to get suggestions for options like the closest coffee shop or lunch spot while I’m driving from Point A to Point B? Sure, I could pull over, open up Google and search for these things separately, but who wouldn’t welcome a truly responsive and local experience within Google Maps?

SearchEngineLand.com click the link to read the rest of the story.

Have you been waiting for this?Join the conversation on our Facebook Page!

What’s really the fastest Windows 10 web browser today?

Every company is claiming their latest web browser is the fastest one yet. So, which one really is the fastest? I took them to the test bench — and here’s what I found.

ZDnet.com  click the link to read the rest of the story.

Which browser do you use?Join the conversation on our Facebook Page!

How My Email Account Got Hacked and the Steps I Took

Warning: this story gets very cringeworthy.

How did I find out? Well I got an email saying that some malicious software had been downloaded on my computer and had obtained some scandalous information about me. The email threatened to release the information they captured if I did not pay them with Bitcoin.

Apparently this is a fairly common email scam that goes around. …

Hackernoon.com  click the link to read the rest of the story.

Has your email been hacked? What did you do?Join the conversation on our Facebook Page!

Digital Transformation: What Not To Do

What’s standing in the way to digital transformation? The Insight survey identified the top five barriers to achieving success. They are legacy IT infrastructure (64%), data security (60%), technology silos (59%), budget (54%), and competing priorities (53%).

These identified obstacles may help some organizations create a better roadmap to success by helping them to anticipate the problems they may encounter along the way.

informationweek.com click the link to read the rest of the story.

Have you started a digital transformation of your business? Lessons Learned?Join the conversation on our Facebook Page!

Passwords Might (Finally) Go Away Soon, Here is why

There’s hope that we can finally ditch long, complex passwords thanks to a series of regulations and open standards that ease and encourage the implementation of passwordless authentication methods in online applications.

“The vast number of passwords needed in our daily lives have become a burden, which is why we see so many reused or weak static credentials,” says Stina Ehrensvard, CEO and Founder of Yubico, which manufactures physical security keys like the Yubikey 5 NFC. “We needed to think about how to address this problem in a way that simplifies the login process while adding the highest level of security. Up until now, there hasn’t really been a way to do both of those things successfully.”

pcmag.com click the link to read the rest of the story.

Are you using or thinking of using a Yubikey?Join the conversation on our Facebook Page!

What will follow the Bitcoin Bubble?

The paradox about Bitcoin is that it may well turn out to be a genuinely revolutionary breakthrough and at the same time a colossal failure as a currency. As I write, Bitcoin has increased in value by nearly 100,000 percent over the past five years, making a fortune for its early investors but also branding it as a spectacularly unstable payment mechanism. The process for creating new Bitcoins has also turned out to be a staggering energy drain.

NYTimes.com  click the link to read the rest of the story.

Have you purchased Bitcoins?Join the conversation on our Facebook Page!

The Essential 2018 Internet Trends Report

Legendary venture capitalist Mary Meeker  has just released the 2018 version of her famous Internet Trends report. It covers everything from mobile to commerce to the competition between tech giants. Check out the full report below, and we’ll add some highlights soon. Then come back for our slide-by-slide analysis of the 20 most important parts of the 294 page report.

TechCrunch.com  click the link to read the rest of the story.

What was most surprising to you in her report?Join the conversation on our Facebook Page!

Amazon Web Services Reinvented the Internet into a Cash Cow

In the summer of 2003, there was an off-site meeting at Jeff Bezos’s house. We were doing this exercise, looking at what we thought our core competencies were as a company. We started off with fairly obvious things, like we were good at having a lot of selection in retail, and we were good at fulfilling that selection.

But when we looked into it more deeply, we realized that in building Amazon’s consumer business as fast as we had in the first eight years, we’d gotten really good at operating infrastructure services, things like computing and storage and database. And because our retail business was a very low-margin business…

NYmag.com  click the link to read the rest of the story.

Will we all work for Amazon in the future?Join the conversation on our Facebook Page!