With much fanfare many security-conscious Apple customers worldwide were excited at today’s headlines announcing Apple’s two-step verification, not to be outdone by other cloud providers and vendors. Google has had this feature for quite some time now. However, the feature is only available in the following countries: U.S., UK, Australia, Ireland, and New Zealand In [...]
Identity Theft is a horrible experience to go through. Just ask anyone who has been victimized. It can takes many years to arrive at a full recovery. So it makes sense to be vigilant about being a victor instead of a victim, as author Dianne Ojar-Ali alerts us in her book Mrs. Fraud and You. [...]
In the midst of all the security alerts you and we receive on a regular basis, this one stands out and you can and should take immediate action. Router manufacturers whose products are affected by the UPnP vulnerabilities include Cisco-owned Linksys, Netgear, Belkin and D-Link, as well as many others. As is reported all over [...]
Here is a map of Trendnet Webcams that were/are publicly viewable by anyone in the world with an Internet connection. Hopefully yours isn’t among them! While this story became very public and it’s about the Trendnet Internet cameras specifically, they are not the only brand of products affected. Any and all devices that can be [...]
The RCMP have been asked to investigate how a federal agency managed to lose an external hard drive in November that contained personal information of more than half a million people with student loans. As a result, the feds are insisting they won’t allow something like this to ever happen again.
A serious security vulnerability (ZDNet) in Java 7 has been discovered, and is actively being exploited. In fact, the U.S. Department of Homeland Security felt the need to recommend that all computer users immediately disable the Java plugin until a patch is finally released by Oracle.
Symantec released new research highlighting widespread “ransomware” scams in Europe, the U.S., and Canada. The research estimates cybercriminals are *extorting* millions each year from victims. The full research can be read here.
Do you roam with your laptop? Do you use hotspots or guest wireless networks? If you answered yes to both of these questions, then you need to read this. I know what you’re thinking: Another security issue I have to worry about? Everything I’ve done to keep my computer safe still isn’t good enough? Not [...]
“OMG! My email is hacked!” This is a true account of an email hack we’ve just witnessed and helped a client through. It all started with one of our client’s bank account manager calling our client (will call him Bob in this email): Bank: Bob, Happy New Year! We have received an email from your [...]