How your privacy can be invaded …
This article about how you give up your privacy from CNN is eye-opening, http://www.cnn.com/2013/06/13/living/buzzfeed-data-mining/index.html?iid=article_sidebar I tried the link listed in the article...
View Article2014 – Once more into the breaches!
Let’s look back at 2014 to review events that could impact our information privacy. Some substantial vulnerabilities occurred this year including the Heartbleed bug, Shellshock, and POODLE, along with...
View ArticleProtect Your Personal Information Cheat Sheet
The amount of information collected on each of us is growing astronomically every day. What can you do to help protect your—as well as your family’s—information? Note: This information is meant to be a...
View ArticleGot Secure Messaging? Part 1 …
When you send a message, who controls your messages? You write them and you get them, but what happens in the middle? Where are they stored? Who can read them? Email, texts, instant messaging and...
View ArticleGot secure messaging? Part 2
Part 1 explains why you might decide to use secure messaging. If you decide you want to use a secure messaging app, here are some factors you might consider: How secure is the program? Does it send...
View ArticleSamsung Galaxy phones, LastPass, and purging online databases
As I do almost every day, I was looking through security news this morning. An article by Graham Cluley about a security issue—CERT CVE-2015-2865 —with the SwiftKey keyboard on Samsung Galaxy phones...
View Article
More Pages to Explore .....