Why File Based Attacks Still Inflict Severe Damage After 30+ YearsOctober 2, 2019
File-based cyberattacks, in which attackers send files, such as Microsoft Word documents or Adobe Acrobat PDFs,...
WhatsApp ‘Delete for Everyone’ Doesn’t Always ‘Delete For Everyone’September 18, 2019
WhatsApp, the world’s most popular chat and messaging app, offers a “Delete for Everyone” feature that...
Women’s Sexual Habits and Other Extremely Personal Information Were Shared With Facebook By Popular Period Tracking AppsSeptember 10, 2019
Two popular period-tracking apps are believed to have shared their users’ personal information – including details...
Incorrect Passwords Entered During Login Attempts Should Be Considered Private DataSeptember 5, 2019
While pretty much everyone in the modern world understands that passwords should be treated as private...
Encryption Company Sues CyberSecurity Conference After Getting Booed, Heckled, And RidiculedAugust 26, 2019
Cryptography startup, Crown Sterling, is suing the organizers of the Black Hat USA cybersecurity conference after...
You Cannot Reset Your Fingerprints: Major Breach In Security System Used By Banks And Police Underscores A Severe Problem With Biometric AuthenticationAugust 15, 2019
The fingerprints of over 1 million people, as well facial recognition information, unencrypted passwords, and other...
POSTS BY DATE
POSTS BY CATEGORY
- Artificial Intelligence (AI) (4)
- Book Review (4)
- Cool Tech (36)
- CryptoCurrency / BlockChain / ICO (27)
- CyberSecurity (231)
- Entrepreneurship (25)
- Events (7)
- In My Humble Opinion… (11)
- InfoGraphic (1)
- New York (6)
- News (59)
- Politics (10)
- Product Review (1)
- Scams and Crime (41)
- Social Media (30)
- Toys / Children (10)
- Video (4)
JOIN MY NEWSLETTER