Contrary to popular belief, phones are susceptible to malicious apps just like desktop computers. In recent weeks there have been dozens of phone apps that have been rejected by the Google Play Store and Apple App Store, but not before they were available for download and use by thousands of people. Not to mention, if… Continue reading Phone Apps Are Not All Created Equal
Author: Russell
Our So Called Virtual Life
Getting our kids ready for school in the morning these last few weeks probably looks different than it did last year. After breakfast my kids go to what used to be a guest room to turn on their laptops at their new Ikea desks and start class. It’s a big leap from the car pool… Continue reading Our So Called Virtual Life
Cyber COVID Threats
Since COVID-19 was first on the news there has been an increasing number of online threats on the subject. Almost every week since April the most common phishing emails have had something to do with COVID-19. These threats come in the form of email attachments, links to fake online COVID maps, and links to phone… Continue reading Cyber COVID Threats
So, Twitter had a week.
On July 15, 2020, more than one Twitter employee was targeted by cyber-attacks. These attacks were successful in acquiring the user name and password of an undisclosed number of employees at Twitter. The Twitter employees’ credentials were used to access several of Twitter’s internal systems including getting through Twitter’s two factor authentication protection. As of… Continue reading So, Twitter had a week.
We need to talk about TikTok
TikTok is a Chinese video-sharing social networking service owned by a Beijing-based internet technology company. It is used to create short dance, lip-sync, comedy, and talent videos. A giant portion of TikTok users are aged between 16 and 24. If you haven’t heard of the app, we promise your children have. As of June 2020 TikTok, had… Continue reading We need to talk about TikTok
No Privacy Without Security
Most people are of the mindset that, “I’m not doing anything wrong so I don’t have anything to hide.” Cyber criminals make a living from that particular mindset. Average social websites people frequent today have stockpiles of information about their users. This mountain of freely available data is at most just one friend request away.… Continue reading No Privacy Without Security
Protect yourself at home.
Remote workers, students, and folks practicing social distancing are becoming more common as we try to quarantine COVID-19 out of existence. People new to working, studying, and spending abnormally large amounts of time at home may get distracted more than their office/classroom counterparts, mixing work and personal emails, texts, and calls. It is easy to… Continue reading Protect yourself at home.
Enable Multi-Factor Authentication to Avoid Theft
If you file your own taxes and you do not use Multi-Factor Authentication (MFA,2FA) you might be putting yourself at much higher risk of exploitation. There are over 2 dozen reports of financial tax information thefts, as of February 14th. MFA or 2FA is a quick, easy, and free way to setup a much more… Continue reading Enable Multi-Factor Authentication to Avoid Theft
Password Security
Would you give a stranger access to your bank account or social media account? No? How about access to your home wifi, personal computer, phone, or security cameras? Of course not! This is a no brainer! But, without strong passwords and thoughtful password handling you are inviting and sharing your accounts and devices with strangers. … Continue reading Password Security