Podcast: Keeping Your Kids Safe from Online Bullies

A study reported by the New York Daily News found that 17 percent of teens reported being victims of cyberbullying, and 69 percent of the teens surveyed said they have done something abusive toward another person online. Dr. Lisa Strohman believes the misuse of technology is a significant factor in…

Continue Reading

How Botnets Are Used to Launch Massive Cyberattacks

Has your computer been acting strangely? If your computer is working at a crawl, you are getting odd error messages and the cooling fan runs even when the machine appears to be idle, it may be part of a botnet. A botnet (or robot network) is a group of computers…

Continue Reading

Are Medical Devices the Next Security Risk?

Many implanted medical devices, such as pacemakers and insulin pumps, now feature wireless connectivity and remote monitoring, enabling health professionals to monitor and adjust the devices unobtrusively. However, as is the case with other Internet of Things (IoT) devices, they can also be discovered and compromised by hackers. Pacemakers and…

Continue Reading

U.S. Senate Considers Baseline Security Standards for Internet of Things (IoT) Devices

A massive DDoS attack in October 2016 that blocked access to many popular websites, including Twitter, Spotify, Netflix, Amazon, Tumblr, Reddit, PayPal and others, used home devices connected to the Internet of Things (IoT) to carry out the attack. As Forbes defines the IoT, “Simply put, this is the concept of basically connecting any…

Continue Reading

Equifax Data Breach May Affect Half of Americans

The Federal Trade Commission says that if you have a credit report, there’s a good chance you’re one of the 143 million American consumers whose personal information was exposed in a data breach at Equifax, one of the nation’s three major credit reporting agencies. The hackers got information including names,…

Continue Reading

Driver’s License Facial Recognition Used to Identify Law Breakers

Many law enforcement agencies at all levels of government have begun using facial recognition to identify possible lawbreakers. The state of New York claims that using the technology on its database of driver’s license photos has led to the arrest of 4,000 persons for identity theft or fraud. A statement…

Continue Reading

Can You Delete Yourself From the Internet?

Do you ever get the urge to escape from the internet and make yourself invisible? Due to the amount of public information online, completely removing yourself is probably impossible. However, you can reduce your exposure and make yourself much less visible online. Do you want to make yourself invisible online?…

Continue Reading

Podcast: Social Engineering: Are You the Weakest Link in Your Security?

Social engineering attacks manipulate users into giving up information wanted by the hackers. They often involve email or other communication to invoke urgency, fear or other emotions in the victim, leading them to reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a…

Continue Reading

Is Your Kid a Hacker?

If your child spends most of their free time alone with their computer, seems to know more than they should about other family members, has multiple accounts you cannot access and their computer is full of encrypted files, they may be a talented computer whiz kid with a bright future…

Continue Reading

Leaked NSA Tools Infect Computers Worldwide

Hacking group The Shadow Brokers has leaked more than a gigabyte worth of weaponized software exploits stolen from the United States National Security Agency (NSA). This toolkit gives anyone, even those without sophisticated technical knowledge, the technology to potentially compromise systems around the world. The Shadow Brokers had attempted to…

Continue Reading

FEATURED PODCAST: SOCIAL ENGINEERING: ARE YOU THE WEAKEST LINK IN YOUR SECURITY?

Social engineering attacks manipulate users into giving up information wanted by the hackers. They often involve email or other communication to invoke urgency, fear or other emotions in the victim, leading them to reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, it can be difficult to prevent these kinds of attacks. The best hope of protecting yourself, your family and your company from social engineering attacks is to be aware of how they work and educate yourself and other users on how to avoid becoming a victim. In this interview, we discuss how to recognize a possible social engineering scam and how to deal with them.

Listen Now