In the recent Yahoo! security breach, 400,000 passwords were compromised. The most shocking part about it is the passwords were stored unencrypted. Thats right.. clear text unencrypted.
Between this most recent breach, LinkedIn, and countless others, other than quitting the internet – what can you do about it to protect yourself?
The following are five simple steps you can take right now to protect yourself and your online accounts:
Continue reading →
OS X running Safari was hacked again at Pwn2own by Charlie Miller for the third year in a row. Tired of Apple’s (and other software companies) lackluster approach to securing their product, he announced he will not be disclosing vulnerabilities to them anymore. He’ll gladly show Apple how he finds them, hoping they will begin […] Continue reading →
Femtocells are in the news lately, especially with AT&T’s announcement of an upcoming nationwide rollout, beginning in April. However, they aren’t the only ones in the Femtocell game. Sprint and Verizon are running trials in select US cities and T-Mobile is testing them in Europe. Let’s explore what exactly is a Femtocell, what does it […] Continue reading →
Wireless hotspots are convenient, and with mobile devices such as the iPhone, Blackberry, iPod Touch, Android phones, the iPad and other wireless gadgets, its not just laptops connecting anymore. With a free and unencrypted connection in a public space, its just as easy and convienient for someone else to monitor your internet traffic. Here’s what […] Continue reading →
Sending someone large files isn’t as easy as attaching them to an email. If you’ve ever tried that, you’ll remember the cryptic “Mailer Daemon / Postmaster Failure” notice you received shortly after. This notice means the email didn’t go through and was dropped. Why? Because many email providers have limits on their attachment size. Go […] Continue reading →