Bumper Sticker Hacking

Steve Jobs drove his Mercedes without a license plate in a bid to be incognito and flaunt the rules the rest of the world follows. Ironically, the lack of a license plate made ...
Read More

10 Most Secure Methods of Communication

Communicating in a fast and modern way brings with it the possibility of privacy invasion and security concerns. Whether it be a large technology company snooping for ...
Read More

4 Common Phishing Lies Exposed

Scammers use different stories to "fish" sensitive information from targets. The goal is to get as much information as possible from the target.  "Smishing" is the term for ...
Read More

California Consumer Privacy Act

The European Union's General Data Protection Regulation (GDPR) has been a lightning rod in the debate over online privacy and data security since it went into effect in May of ...
Read More

Instant 12 Question PCI DSS Assessment

Companies that accept credit cards must comply with certain standards set out by the Payment Card Industry Security Standards Council. The standards help ensure the card data ...
Read More

4 Ways to Get a Virus

Having your computer infected with malicious code is a difficult experience. The person whose device gets infected is not wholly innocent however. Unless the virus is on a ...
Read More

Biometric Hacking

Biometric identification is in the palm of every modern smart phone users' hands. People can unlock their devices with their face, eyes or fingerprints. Businesses have adopted ...
Read More

[Quiz] How Should You Deploy Your SIEM?

A Security Incident and Event Management (SIEM) tool ingests logs from your environment, correlates the data and can disseminate insights via alerting, visual dashboards or ...
Read More