Why Is Multi-Factor Authentication Important? 

Responsible for securing institutions, all the way from colleges to banks, multi-factor authentication is a layered approach to securing individuals’ data. Yet despite its importance, many users do not understand the principles behind multi-factor authentication or how it differs from the ubiquitous two-factor identification. In this episode, we will discuss…

Continue Reading

Apple & Google Team Up

For many of us, our phones and applications are an important source of information and convenience: look no further than the map apps we turn to when we are in a new place or looking for the fastest commute to work. At their core, devices that allow us to keep…

Continue Reading

New State-Level Privacy Laws

In a previous article (The “California Effect,” Again), we observed the sudden rise in states making changes to their privacy laws: recently, California became the first in the nation to impose severe restrictions on internet companies’ interactions with minors. Although it will not go into effect until 2024, this law…

Continue Reading

Google Malvertising

By now, we have all used Google’s search engine enough to know that the top-ranking pages are the most popular pages: “top-ranking” does not necessarily ensure the most accurate or even the most pertinent information. This is because search engines operate from an algorithm that assesses which content is the…

Continue Reading

Homeowners & Amazon Products

According to Consumer Intelligence Report Partners, two-thirds of Americans who shop on Amazon own at least one of its smart gadgets. However, what many of these consumers are not aware of is the fact that Amazon collects more data than nearly other company. As we have previously explored, with Ring…

Continue Reading

The FTC Comes Down on Facebook

In 2020, the Federal Trade Commission sued Facebook (now Meta), alleging that “the company illegally maintain[ed] its personal social networking monopoly through a years-long course of anticompetitive conduct.” This decision was predicated on evidence that showed Meta was operating against the spirit of anti-trust legislation and resulted in a privacy…

Continue Reading

The Crypto Privacy Problem

Over the past year, the world of cryptocurrency has experienced intense upheaval for what benefactors had once championed as a stable industry. In November, the downfall of Sam Bankman-Fried and FTX sent shockwaves through financial circles. Once worth up to $40 billion, FTX collapsed after surging withdrawals overwhelmed a company…

Continue Reading

Voter Files and Public Elections

With the Cambridge Analytica scandal of 2016, the role of voter information was suddenly thrust into the political spotlight. In the years since, we have become increasingly aware of the ways in which our voter files can be manipulated and sold to the highest bidder. But what is a voter…

Continue Reading

Cloud Security Attacks

Although we have previously written about cloud security, the outlook of 2023 suggests that cloud security attacks will once again be on the rise. With previous attacks striking major corporations like Facebook, LinkedIn, and Marriott, it is clear that nobody is immune. When enacting cloud attacks, cybercriminals are searching for…

Continue Reading

The SEC & Cybercrimes

In 2020, the prominent legal firm, Covington & Burling suffered a cyberattack in which a foreign actor may have accessed nonpublic information about clients, including 298 regulated companies. As a result of the attack, The Securities and Exchange Commission (SEC) opened an investigation to analyze who was affected, how, and…

Continue Reading

Crimeware-as-a-Service

Arguably, one of the most impactful software trends over the last decade is the ubiquity of software-as-a-service (SaaS) applications. Instead of downloading and storing software on your computer, an outside company hosts the application on their server and allows you to access it at a price. This is a convenient…

Continue Reading

HIPAA & Cyberattacks

Throughout the most challenging moments of COVID-19, we saw firsthand what happens when our healthcare systems are overwhelmed and stretched to the brink. This breaking point is tested even further when these systems are forced to defend against cyberattacks at their weakest moments. At the highpoint of COVID, multiple healthcare…

Continue Reading

The EU’s Move on Cybersecurity

At the end of 2020, the European Commission introduced a new EU Cybersecurity Strategy. This strategy was designed to build upon the previous NIS (Network and Information Systems) Directive, which is perhaps the most comprehensive cybersecurity directive in the world. Not only was it responsible for creating the foundation for…

Continue Reading

The Dangers of Data Sharing

With the advances in cloud technology, there are few experiences as convenient as data sharing. Able to be used by large organizations and extended families alike, data sharing allows multiple parties to gain access to shared files at the same time. Say, for example, that you have pictures taken during…

Continue Reading