Tech Insights

rss

Contributor Columns on Information Technology and Security

Studies across the board indicate that weak usernames and passwords are one of the top causes of data breaches, and I find that information to be unfortunate, because it is preventable. According to a recently concluded survey conducted by uSamp and sponsored by Siber Systems, creators of the RoboForm Password ...

If you’ve heard this once, you need to hear it again—and again: Never use the same password and username for more than one account! If this got Mark Zuckerberg’s (Facebook’s chief executive). Twitter account hacked, it can get just about anybody hacked. A report at nytimes.com says that the OurMine hacking ...

The Dark Web, according to LeakedSource, got ahold of 33 million Twitter account details and put them up for sale. Twitter thus locked the accounts for millions of users. Twitter, however, doesn’t believe its servers were directly attacked. So what happened? The bad guys may have created a composite of ...

Let’s cut to the chase: Regularly back up the phone’s data! If this is done every day, you won’t have to worry much about losing important information if something happens to the phone—such as a ransomware attack. Keep the phone’s software and applications updated. Delete apps you no longer ...

It’s all about code—the building blocks of the Internet. Software code is full of unintentional defects. Governments are paying heavy prices to skilled hackers who can unearth these vulnerabilities, says an article at nytimes.com. In fact, the FBI director, James B. Comey, recommended that the FBI pay hackers a whopping ...

A crook can steal your identity by taking control of your wireless phone account—by pretending to be you in person at the mobile store. The villain can then buy pricey mobiles and sell them—and guess who gets the bill but not the profit. Symptoms of Hijacked Account Suddenly losing service ...

The days of using a computer to access your bank account, using a password, may be coming to an end, to be replaced entirely (as some experts believe) with a fingerprint or face scan using a smartphone. The smartphone employment of such biometrics will drastically reduce hacking incidents, but will ...

If you have a strong password for your Amazon account, you may still want to consider beefing up the security with two-factor verification (or authentication), which will prevent a thief from accessing your account (which is possible if he gets ahold of your password and username somehow). Log onto ...

Late last month, nearly 200 million Yahoo email accounts went up for sale on the dark web at a pretty nominal cost of just 3 bitcoins (just over $1700). The dump, which contains the usernames, passwords, date of birth as well as alternate IDs of millions of still-active users, ...

Criminals often rely on tricking their victims to gain access to their passwords and other account information. This act of tricking is called social engineering, also known as a confidence crime, and it comes in many forms. A type of phishing e-mail where the criminal targets someone specific is ...

The Number One Menace to All Organizations
 

Learn more about how to protect your organization against this growing menace
https://info.knowbe4.com/ransomware-simulator-tool-its