Preparing Your Wallet For Vacation
Protecting our identities and finances online is hard enough as is, but it’s even harder when you’re trying to relax on vacation in an unfamiliar place – particularly if that
“We are what we pretend to be, so we must be careful about what we pretend to be.” ― Kurt Vonnegut
177 articles
Protecting our identities and finances online is hard enough as is, but it’s even harder when you’re trying to relax on vacation in an unfamiliar place – particularly if that
For a very long time, Apple and its pseudo-religious user-base prided itself on being a platform free of malware; those days are inarguably and unequivocally over. Its emergence as the
Google provides some pretty strong security controls like two-factor authentication in order to prevent hackers from hijacking your account and other controls that allow you to recover your account in
Whether or not it is possible to hack a car depends almost entirely on the kind of car you drive. I, for example, drive a 1998 Honda Accord, and I’m
You may want to think twice about using your iPhone as a wireless hotspot. A group of researchers from the Department Informatik at Friedrich-Alexander-Universität Erlangen-Nürnberg in Germany developed software allowing
If computers themselves are relatively new in the grand scheme of things, then mobile devices are incredibly new. And likewise, just as we’ve spent the better part of the last
Have you ever wondered what a hacked computer, email address, or other online account is even worth? Sure, it seems pretty obvious that there’d be some serious value in a
In late 2011, it emerged that Chinese hackers had thoroughly compromised the United States Chamber of Commerce, perforating the lobbying-group’s networks with a devastating chain of backdoors. Chamber officials admitted
There’s been something of an uneasy consensus among experts that Apple’s iOS platform is the most secure option among mobile operating systems almost exclusively because of the closed-off nature of
APT stands for advanced persistent threat. It became famous following a New York Times exposé detailing a month’s long attack campaign in which a Chinese military unit now known as
If Achilles’s heel was his vulnerability in the Iliad, then Paris’s poison tipped arrow was the exploit. Quite literally, an exploit is the device or – more often than not
Another day, another online service adds two-factor authentication to its list of features. This time it was Evernote, the cloud-based note-taking service that hackers managed to compromise and use as
We recently wrote about the conspicuous lack of privacy discussion at Google’s recent I/O Conference in San Francisco. While it’s true that there wasn’t much talk of privacy at the
Everybody talks about HTTPS and being careful with credit or debit cards online, but what makes you think your cards are safe offline? I can’t speak for anyone other than
Google Glass was among the main attractions at the Mountain View, California search giant’s developer-centric I/O conference in San Francisco last week. We had high hopes that Google would address
Microsoft (and Adobe for that matter) released a slew of security updates in the May 2013 edition of their monthly patch Tuesday release. As always, if your machine isn’t set
When the U.S. Government comes poking around the world’s major Internet companies asking for customer data, Verizon, AT&T, Apple, and Yahoo are not particularly interested in protecting the general public,
Permanent deletion by default after a predetermined amount of time is the gimmick that drove Snapchat users to upload more than 150 million photos a day in April. Problematically, Snapchat’s
Given the deftness of malicious hackers, the bar-lowering impact of easily accessible markets for automated cybercriminal kits, and the increasing number of online services and people connected to the Internet,
If we really wanted to thoroughly discuss ‘HTTPS’ and Digital Certificates, then we’d need to talk about cryptography, but don’t worry, because we’re going to go ahead and spare you
“Snapchat is a new way to share moments with friends,” reads the opening sentence of the temporary photo-sharing application’s “about us” page. The description is just vague enough to technically