Today's Question:  What does your personal desk look like?        GIVE A SHOUT

 DATA SECURITY


  Should All Web Traffic Be Encrypted?

The prevalence of free, open WiFi has made it rather easy for a WiFi eavesdropper to steal your identity cookie for the websites you visit while you're connected to that WiFi access point. This is something I talked about in Breaking the Web's Cookie Jar. It's difficult to fix without making major changes to the web's infrastructure.In the year since I wrote that, a number of major websites have "solved" the WiFi eavesdropping problem by either making encrypted HTTPS web traffic an account option or mandatory for all logged in users.For example, I just noticed that Twitter, transparently to me...

3,186 0       SECURITY WEB TRAFFIC HTTPS.ENCRYPTION WIFI


  bcrypt: Safeguarding Passwords with Strong Hashing and Adaptive Security

IntroductionIn today's digital world, passwords play a crucial role in protecting personal privacy and information security. Passwords are the most commonly used means of authentication because they are simple yet effective. Password security is the cornerstone of cybersecurity and plays a fundamental role in safeguarding the information security of individuals and organizations. However, with the increasing frequency and complexity of cyberattacks, traditional password hashing algorithms like MD5 and SHA series have proven to be inadequate against modern security threats. Therefore, using str...

3,039 0       BCRYPT SECURITY


  Privacy & Security What Is the Difference?

                     When we discuss the internet today, there are two terms that we frequently here: privacy and security. While you may think that these two terms mean the same thing and are thus interchangeable, this isn’t true. As such, you’ll want to take a moment to learn the difference between these two terms.Understanding the Difference Between Privacy and SecurityWhen you open a checking account you share your personal information with your bank. There are three results that may occur here:The bank may maintain yo...

1,993 0       PRIVACY SECURITY CYBERSECURITY


  Simple Strategies to Boost Your Android Phone Security

Android is one of the safest operating systems for smartphones and tablets if used correctly. Unfortunately, only a third of Android users use the latest version, and older versions are far more vulnerable than newer ones.Not to mention that many manufacturers take their time when it comes to downloading the latest security patches. A news blog Android Authority ranked the fastest manufacturers in downloading system updates. Here are the results:LG - 78 daysMotorola - 88 daysHTC - 95 daysSony - 99 daysXiaomi - 126 daysOnePlus - 131 daysSamsung - 143 days.Since the ranking took place in 2017, t...

1,882 0       ANDROID DATA SECURITY


  10 Easy Things to Do to Enhance Your Online Security Today

If you think you don’t need to take extra steps to increase your cyber security, you are wrong. Statistics on cybercrime are shocking and clearly prove that you can’t have ‘too much security’ while using the Internet today. For example, did you know that by 2023 cybercriminals will have stolen over 33 billion private records or that 15 million Americans became victims of digital identity theft in 2017 (Norton)? That’s not even mentioning millions of monetary losses that occur every year because of cybercrime.Overall, you need to get extra layers of online security...

1,257 0       SECUIRITY DATA SECURITY


  Recent Online Scams You Need to Know About

It’s easy to forget that the internet is a dangerous place and that it’s easy to become a victim. Everyone wants to think that they’re too smart to fall for online scams or obvious fraud. Yet actions speak louder than words, and 97% of people still struggle to identify a phishing scam. Awareness is critical in beating the cybercriminals. So here are examples of the latest online scams and tips on how to avoid becoming a victim of similar attacks.What are Online Scams?Online scams come in many different forms but generally originate from one of four platforms: email, SMS, webs...

1,239 0       DATA SECURITY VPN


  5 Things You Can Do to Protect Your Data

The average cost of a data breach is $148 per record. Records include everything from personal addresses to birthdates to even more sensitive data, like Social Security Numbers and business files. Each year, these hacks cumulatively cost billions of dollars to companies and individual users. Nonetheless, like many other criminals, hackers tend to prey on easy targets. By following these essential steps, you’ll be able to ensure your data is always kept safe.1) Use a File Encryption ServiceMost people remember when a few years ago hackers cracked open the cloud accounts of a range of diff...

1,166 0       DATA SECURITY


  Public Vs. Private Cryptocurrency Keys

Before investing in any form of cryptocurrency, you must become familiar with the terminology used in the industry. This will prevent mistakes that could jeopardize your entire investment, and no one should be investing in any type of security or asset that they don't fully understand first.Crypto WalletsBefore we even delve into what public and private keys are, we first need to discuss what the keys are for. Your Bitcoin or crypto wallet is basically the account that you store your cryptocurrencies in after purchase. It is entirely controlled by you, and this level of control means that unfo...

1,153 0       SECURITY CRYPTOCURRENCY