Will VPNs Become Obsolete In 2019?

If you just want your passwords and banking information to stay secure, then a VPN is already obsolete. HTTPS keeps your passwords and other information inaccessible for hackers by utilizing strong encryption, no VPN required. However, if you want privacy, you’ll need a VPN.

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

Do you use a VPN?

Join the conversation on our Facebook Page!

Intel CPUs vulnerable to the new Zombieload attack

Academics have discovered a new class of vulnerabilities in Intel processors that can allow attackers to retrieve data being processed inside a CPU.  The leading attack in this new vulnerability class is a security flaw named Zombieload… academics say that all Intel CPUs released since 2011 are most likely vulnerable. Processors for desktops, laptops, and (cloud) servers are all impacted

ZDNet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you still use Intel chips?Join the conversation on our Facebook Page!

Major Antivirus companies secrets being sold on dark web

A collective of Russian and English-speaking hackers are actively marketing the spoils of data breaches at three US-based antivirus software vendors. The collective, calling itself “Fxmsp,” is selling both source code and network access to the companies for $300,000 and is providing samples that show strong evidence of the validity of its claims. …

Arstechnica.com click the link to read the rest of the story. Our FREE Tools can help!

How much trust do you have in your Antivirus program to protect you?

Join the conversation on our Facebook Page!

Microsoft: We promise you’ll get better controls over your data

Microsoft on Tuesday announced that it will change how it collects data from devices when customers use its services, introducing the new ‘required’ and ‘optional’ categories for data collected, say, when enterprise customers use Office 365.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

What do you think about this change?

Join the conversation on our Facebook Page!

Cloud database leaked private details of 80 million US families

The addresses and demographic details of more than 80 million US households were exposed on an unsecured database stored on the cloud, independent security researchers have found.  The details included names, ages and genders as well as income levels and marital status. …

Cnet.com click the link to read the rest of the story.

Is your cloud data secure?

Join the conversation on our Facebook Page!

Top 5 risks innovation is forcing businesses to face

Complying with rapidly accelerating privacy regulations is the top emerging risk faced by organizations globally, even above the talent shortage, according to a Thursday report from Gartner. …”With the General Data Protection Regulation (GDPR) now in effect, executives realize that complying with privacy regulations is more complex and costly than first anticipated,” Matt Shinkman, …

“More budget dollars from IT, legal and information security are going to address GDPR compliance, just as the California Consumer Privacy Act (CCPA) is set to take effect, adding another layer of complexity for companies to navigate in this area.”

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

Is your company compliant with the new California Consumer Privacy Act?

Join the conversation on our Facebook Page!

You Need Multiple Layers of Security

The findings in the Identity Theft Resource Center (ITRC)’s “2018 End-of-Year Data Breach Report” serve as a stark reminder of why companies should take a layered approach to security.

SecurityIntelligence.com click the link to read the rest of the story.

How many layers of security do you have?

Join the conversation on our Facebook Page!

A Few Simple Steps to Vastly Increase Your Privacy Online – update

The short answer is that a VPN is a great way to increase your privacy. The only problem is that you are still ultimately putting your trust in the VPN provider that they are not logging your browsing, that they won’t sell your data…

Thetoolsweneed.com click the link to read the rest of the story.

How concerned are you about privacy?

Join the conversation on our Facebook Page!

Cybersecurity is broken: Here’s how we start to fix it

We are building our future on a creaking digital foundation. It’s time for that to change. Cybersecurity is in a terrible state, possibly the worst it’s ever been. Literally not a day goes by without another report of a security breach or a data spill or a hack spilling corporate secrets.

This to me is the way to turn the tide. First, we need to value our own personal data more. …

ZDnet.com click the link to read the rest of the story.

What do you think we should do?
Join the conversation on our Facebook Page!

Reviewing Everykey – No More Passwords No More Keys

John McAfee has a solution for those that hate passwords and know they need more secure ones.  McAfee’s solution?  It’s called Everykey and it promises to eliminate the need of passwords on your computer, websites but also your car, front-door, etc.  Everykey was launched in 2014 and it received mixed reviews at the time.  But now 5 years later they have released a new version of the firmware and Ingenious Geeks have begun to  test it here for you.  So far, it is impressive!  We have hit a few bumps in the road but it can do some amazing things.

Have you tried the updated version of the Everykey? If so, please let us know your experience.  Ours has been very positive, thus far.  Check back, we will be releasing a full review.


Everykey.com click the link to read the rest of the story.

Do you have a unique password for all of your internet accounts?

Join the conversation on our Facebook Page!

Why it’s so dangerous to use public Wifi

Most smartphones, laptops, and tablets automatically search and connect to WiFi networks. They usually prefer a network with a previously established connection. If you have ever logged on to the T-Mobile network on the train, for example, your device will search for a T-Mobile network in the area. … My phone automatically connects itself to one of these networks, which  [can] belong to [a hackers] device. [Hackers] can also broadcast a fictitious network name, making users believe they are actually connecting to the network of the place they’re visiting

Everything, with very few exceptions, can be cracked. The idea that public WiFi networks are not secure is not exactly news

Medium.com click the link to read the rest of the story.

Do you still use public wifi?Join the conversation on our Facebook Page!

Here are the data brokers quietly buying and selling your personal information

You’ve probably never heard of many of the data firms registered under a new law, but they’ve heard a lot about you. A list, and tips for opting out.

FastCompany.com click the link to read the rest of the story.

Will you use this list to opt out?Join the conversation on our Facebook Page!

Use a Cisco router? Patch it now ! It’s a 9.8/10 Security hole

Cisco is warning businesses that use its wireless VPN and firewall routers to install updates immediately due to a critical flaw that remote attackers can exploit to break into a network.  The vulnerability allows any attacker with any browser to execute code of their choice via the web interface used for managing Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router.

ZDNet.com click the link to read the rest of the story.

Have you made sure yours is patched?Join the conversation on our Facebook Page!

Why Online Privacy Matters and 5 Ways to Reclaim It

It’s the most common argument against privacy: “If you’ve got nothing to hide, you’ve got nothing to fear.” It’s also the silliest argument against privacy.

Privacy expert and author Daniel Solove has torn down this fallacy in his paper on the subject. But Solove’s essay is a complex take on a nuanced subject. Instead, the simple rhetoric of the “nothing to hide” argument is easier to repeat.

But no matter how little you have to hide, the implications of online privacy breaches are major. These few resources explain the pitfalls clearly and concisely.

MakeUseOf.com click the link to read the rest of the story.

What steps have you take to regain your online privacy?Join the conversation on our Facebook Page!

New Google Chrome Add-On Warns When Your Password Isn’t Private

If someone else has used the same password as you and it’s listed in a dump, guess what? Your own account is also at risk. It doesn’t even matter if you used that password on a different website. Once it’s exposed, it’s just not safe to use any more.

With leaks and hacks happening more or less non-stop it’s a difficult task to keep your accounts secure.

Forbes.com click the link to read the rest of the story.

Did you know how easy it was to have a risky password?Join the conversation on our Facebook Page!

Billions of Hacked Passwords and Usernames now Free: on the Dark Web

More than 600 gigabytes of hacked accounts from years ago have been compiled and are free to download.

You can check if you were affected by the massive data set with the HPI’s search tool.

Cnet.com click the link to read the rest of the story.

Have you checked to see if your accounts have been hacked?Join the conversation on our Facebook Page!

Fake meeting request from the boss steals passwords

Called to a meeting with the CEO? Don’t be so sure.

A widespread phishing campaign is targeting executives across a number of industries with messages asking to reschedule a board meeting in an effort to steal logins and passwords.

ZDNet.com click the link to read the rest of the story.

Has your office received on of these yet?Join the conversation on our Facebook Page!

How to use Google’s Password Alert tool to thwart phishing attacks

Google’s built a new tool in the fight against phishing. The free Password Alert Chrome extension keeps track of where you enter your Google account password and alerts you when you’ve entered it someplace other than accounts.google.com. This does two things: it prevents you from re-using your Google password on other sites, and it protects you if you’ve entered your password on a site that’s pretending to be Google to collect your private information, a practice also known as phishing.

Cnet.com click the link to read the rest of the story.

Have you been scammed into giving up your gmail password?Join the conversation on our Facebook Page!

Configuring Your iPhone for Maximum Privacy and Security

In this article, it’s my goal to help you focus on security and privacy (two different but equally important matters) on the iPhone, specifically with regard to your phone’s data connection—the internet connection you use for surfing the web or using apps. … there is no such thing as perfect security or perfect privacy online, only best practices and best tools. Anyone who promises you otherwise is lying or ignorant….

betterhumans.coach.me click the link to read the rest of the story.

Which of his suggestions are you going to try first?Join the conversation on our Facebook Page!

Chinese Facial Recognition Will Take over the World in 2019

The best facial recognition startups are in China, by a long-shot. As their software is less biased, global adoption is occurring via their software. … A computer system that can track and identify any face anywhere is coming to global citizens. This is because capitalism isn’t regulated, it’s bullish on AI in an exaggerated sense where profits matter and efficiency fits the crime. As Chinese innovation start to get ahead, so too will Chinese ethics infiltrate the rest of the world. …

Medium.com click the link to read the rest of the story.

What should be done to protect our privacy?Join the conversation on our Facebook Page!

How Much is Your Privacy Worth To You?

The price for our privacy is surprisingly low.

This first hit me quite some years ago, while I was working with a very successful restaurant group. I was conducting an experiment in customer service…

Hackermoon.com click the link to read the rest of the story.

How much is your privacy worth?
Join the conversation on our Facebook Page!

New Trojan attack adds a backdoor to your Windows PC to steal data

A well-resourced and prolific hacking group is distributing a new strain of malware that gives the hackers remote desktop access as part of an information-stealing campaign targeting banks, retailers and businesses. … The remote access trojan capabilities of FlawedGrace mean it allows attackers to gain almost full control over an infected device. Given how the campaign targets banks and retailers, it’s likely that acquiring money is the ultimate goal of the attacks…

ZDNet.com click the link to read the rest of the story.

How are you protecting yourself from these attacks?Join the conversation on our Facebook Page!

How Amazon knows so much about you – and how to regain your privacy

If you are not happy with the amount of information Amazon holds about you, click through this gallery to find out what you can do to control how much of your private data it has.

ZDNet.com click the link to read the rest of the story.

Wish you knew simple ways to protect your online privacy?Join the conversation on our Facebook Page!

Five emerging cyber-threats to worry about in 2019

We’re going to see more mega-breaches and ransomware attacks in 2019. … But cyber-defenders should be paying attention to new threats, too.  Here are some that should be on watch lists:

Thanks to advances in artificial intelligence, it’s now possible to create fake video and audio messages that are incredibly difficult to distinguish from the real thing. These “deepfakes” could be a boon to hackers in a couple of ways. AI-generated “phishing” e-mails that aim to trick people into handing over passwords and other sensitive data have already been shown to be more effective than ones generated by humans. Now hackers will be able to throw highly realistic fake video and audio into the mix, either to reinforce instructions in a phishing e-mail or as a standalone tactic.

MITTechnologyReview.com click the link to read the rest of the story.

Are you taking security more seriously this year?Join the conversation on our Facebook Page!

Why you should switch to Signal or Telegram from WhatsApp, Today

WhatsApp and Facebook will start tracking everything you do on your phone to tailor ads to you. They will see your contacts list (which they already are, actually). This is a clear betrayal, for many users. But for some of us who are (kind of ) paranoid about security and privacy online, this was an obvious next step after Facebook’s acquisition of WhatsApp. So what should you do?…

Medium.com click the link to read the rest of the story.

Are you concerned about privacy?Join the conversation on our Facebook Page!

Why you should be using encrypted email

Email leads users to share highly sensitive information in a seemingly private way when, in reality, it’s everything but private. Case in point: see the image below and note a typical unassuming email containing a person’s credit card information. This may seem like a stupid mistake, but you’d be surprised at how common these type of emails get sent on a daily basis (I’m looking at you, mom). The only factor taken into consideration by the sender in these cases is that they trust the person on the receiving end. The problem here is…

Medium.com click the link to read the rest of the story.

Is your email secure? Are you certain?Join the conversation on our Facebook Page!

How Our Data Got Hacked, Scandalized, and Abused in 2018

This year tech giants, governments, and even the humble sandwich chain have proved that we can trust no one with our personal data. At best, these companies were woefully underprepared to keep our data safe. At worst, they allowed the data we gave them to help others influence our fragile democracy.

When it came to data scandals and breaches in 2018, the only good news was…

FastCompany.com  click the link to read the rest of the story.

What lessons did you learn about your security needs last year?Join the conversation on our Facebook Page!