Think your phone has been hacked? Here’s what to do next

Think Your Phone Has Been HACKED? Here’s What to Do Next

Cybercriminals could hack your phone without your knowledge. If you notice any problem with your Android or iPhone, the chances are that hackers have a walk in the park in your entire device.  It’s essential to keep your devices secure to ensure you’re not missing on that email, call, message, reminder, and more. Advanced technology…

8 ways to lock your mac

8 Ways to Lock Your Mac

You need to keep your Mac safely locked whenever you are away from it. While locking may not interrupt or quit any running programs, you will need to type the password to regain access. Read on to learn the eight simple ways to keep your Mac locked. You need a Password to Regain Access to…

Your guide to smart device security privacy

Your Guide to Smart Device Security Privacy

Smart technology and smart devices are increasingly becoming essential tools in our daily lives. It’s estimated that about 35% of households in the U.S. had at least one smart speaker and that this would increase to 75% by 2025. In 2020 there are about 20.4 billion (with a “b”) smart devices connected to the internet…

To use a vpn or not: much ado about security and privacy

To Use a VPN or Not: Much Ado about Security and Privacy

The Internet has grown to become a major part of life as it exerts influence on all areas of human endeavors. The Internet plays a part in your education, ability to create wealth, monitor your health, maintain relationships, and even find good food in out of way places. The Internet, despite all its benefits also…

Your guide to california’s cell phone “kill switch” law

Your Guide to California’s Cell Phone “Kill Switch” Law

Starting mid-2015, all cellphones sold in the state of California will need to include a built-in device that will enable a phone’s owner to wipe and disable the phone remotely — also known as a “kill switch”. The new law will be the first of it’s kind in the U.S., having finally passed the state’s Senate…

Silent beacon: overview and exclusive interview

Silent Beacon: Overview and Exclusive Interview

Two weeks ago, as I was going home after work, I noticed four young guys walking behind me. I assumed that I was slowing them down and edged closer to the wall to let them pass through, only to realize that the boys were now intentionally blocking my way – ambling too slow for me to be able to walk…

10 worst computer viruses in history

10 Worst Computer Viruses in History

I knew there was a problem when my computer had been frozen on the startup screen for five minutes. Five hours, a consultation with a friend who does managed IT services in Atlanta, and ten reboots later, I knew it was a life-threatening one. For my computer, sure, but most of all for me. What…

Gatekeeper chain automatically locks your computer

GateKeeper Chain Automatically Locks Your Computer

We’ve all seen the sad saga unfold: someone unwittingly left their laptop open to Facebook, a “friend” thought it would be funny to post an embarrassing secret about them, and they end up being humiliated in front of their unrequited crush and entire circle of friends. But frenemies aren’t the only people interested in taking…

Sound ideas: google advancing security measures with slicklogin purchase

Sound Ideas: Google Advancing Security Measures with SlickLogin Purchase

Strong user verification has become a linchpin of internet operations in recent years, and for very important reasons. With more and more information—professional and personal—stored in the cloud alongside countless digital libraries containing games, books, albums and software, and online banking in the ascendancy, the risk of theft or other relevant kinds of fraud has…

Snapchat and skype sites compromised by well-intentioned vigilante operations

Snapchat and Skype Sites Compromised by Well-Intentioned Vigilante Operations

Another year, another round of sobering reminders that we might as well have all the information that flows through our internet endeavors neatly inscribed on our foreheads for all the good standard online security protocols do. 4.6 million users of the carelessness-enabling temporary photo service Snapchat have had their account details partially distributed, while some…

Cryptolocker and the escalating sophistication of malicious internet attacks

Cryptolocker and the Escalating Sophistication of Malicious Internet Attacks

I worked for some time in technical support, remotely accessing computers and resolving issues, or at least attempting to resolve them. Antivirus suites have come a long way in recent years, and there are various excellent free programs available. Furthermore, for the most part, viruses, Trojans and pieces of malware tend to be pretty similar…

Gaming industry security crisis

Gaming Industry Security Crisis

We’re living in troubling times, folks. Cyber-criminals are getting smarter, and the methods we’ve got to combat them simply aren’t evolving quickly enough to keep up. The ever-increasing instance and severity of breaches we’ve been seeing of late should be evidence enough of that. Everything from Facebook to Google to Washington State itself has been…

Facebook security risk left knocking on zuckerberg’s wall

Facebook Security Risk Left Knocking on Zuckerberg’s Wall

Hey Mr. Zuckerberg, your Facebook is broken. Facebook Security Risk Left Knocking On Zuckerberg’s Wall You wouldn’t think that someone would have to go directly to the creator of Facebook in order to get a security concern handled. Sadly, that is exactly what Khalil of Palestine was forced to do in order to be taken…