There is a real difference between entering some key words or phrases in a search engine and actually researching something. Continue reading
Cyber hackers often are portrayed as anonymous villains, lurking in the shadows to wreak Internet havoc against corporations, individuals and governments alike. By the nature of their “work,” knowledge of their activities is limited, but even less is known on how they feel about what they’re doing.
For a few days in August in Las Vegas, a portion of the hacker population surfaced at the Black Hat Conference, a leading confab for cyber security experts. Thycotic, a Washington, D.C.-based security firm, in an anonymous survey was able to probe the thoughts of 127 self-confessed hackers while at the conference. Their responses shed some rare light on motivations for hacking – and how they approach their troublesome work. Continue reading
Advances in technology over the past decade have led to a proliferation of smartphones, which has cemented their position as a hub of business, social and financial life for many consumers. But with their increasing prevalence is an accompanying spike in the numbers of lost and stolen phones.
Consumer Reports’ latest “State of the Net” survey shows that smartphone theft nearly doubled from 2012 to 2013, with 3.1 million devices falling into the wrong hands – and another 1.4 million phones lost and not recovered.
It’s back-to-school time for students of all ages – from elementary to college – which means their time in front of computers and mobile devices will be increasing. The upswing in online activity also is accompanied by an increased risk for exposure to cyber threats, from hackers and online predators to malware and software bugs.
While nearly everyone already has seen suggestions for better online safety, the return of school in session is an ideal time to review a few common-sense security tips that you should implement on your younger children’s behalf – or reinforce with your teenagers. Continue reading
It seems that a day doesn’t pass without a new report of internet security vulnerabilities – either on a website or in commonly used downloaded software. It leaves us to wonder why no large-scale effort is in place to stem the tide of hacker attacks and mischievous malware designed to exploit these flaws.
Such an effort now may be getting under way with the announcement last month that Google is devoting resources to form a team for the greater good of improving security across the internet. Continue reading
The dust is settling from the latest major Internet security breach – a massive hack by a Russian crime gang that compromised more than 400,000 Web and FTP sites and may have exposed more than 1.2 billion user passwords, IDs and email addresses. It may be the largest theft of security credentials in history – so far.
If there is a positive spin to put on this cybercrime, according to a respected security firm, it appears that the stolen data do not involve a large amount of detailed credit-card information. Instead, the pilfered IDs, passwords and email addresses may be used primarily to generate spam that advertises dubious consumer products.
This latest incident is bound to give Internet users a renewed sense of vulnerability, and the sheer scope of it means it’s likely that one or more of your password-protected sites may be affected. The initial strategy to combat these thieves is simple: Change your passwords immediately!
But a thoughtful approach to password selection will help you gain a measure of extra protection from organized “phishing” expeditions that hackers use to gain unauthorized account access.
First, the experts advise you to use a unique password for each of your online accounts – having one common password for access to all sites just makes it easier for one hack to unlock the keys to your Internet kingdom. And get in the habit of changing them frequently (at least every six months) to stay at least slightly ahead of the cyber theft curve.
When it comes to constructing a new password, simplicity is not beautiful. Instead, complexity should be your goal. Try using long phrases or even sentences familiar to you that can be condensed into strings mixing upper and lower-case letters, numbers and special symbols.
Of course, longer, complex passwords are more difficult to remember, but don’t create an additional opportunity for hackers by storing passwords for reference in a document on your computer.
Password managers such as LastPass, Dashlane and KeePass can be effective tools to organize and maintain a host of complex passwords. But they also can be subject to hacking in a worst-case scenario, so passwords or other ID credentials for these master sites must be appropriately secure. Yet, even with this risk, password managers are an extra layer of protection that’s a step forward.
Another even stronger layer of security is available from using two-factor authentication to log-on to your favorite online service – a system that requires entering a password and a second one-time code, often generated through a mobile device that has been linked to the account.
Already, sites such as Amazon, Microsoft, Gmail and Twitter offer it, and you should enable this process if given the option. While no solution is fool-proof, any extra step that makes it more difficult for hackers to penetrate site security is valuable.
Don’t wait for the next headline about a security breach to take action: be proactive and vigilant about managing your passwords. And by using tools already offered by Frontier Secure to help manage your online security, you have a head start on staying a step ahead of the next hack attack.
Big data is a generic term used to describe any collection of data sets that are so large and complex that they become too complex to process using regular data management tools or traditional data processing applications.
The sheer volume of data creates challenges in capturing, storing, sharing, and analyzing the data to find meaningful information.
Two-factor authentication (also called two-step authentication) is a process that requires two pieces of information to verify who you are.
The goal of two-factor authentication is straightforward; if someone gets ahold of one piece of authentication information – like your password, they still won’t be successful in taking over your account or device because they don’t know the second piece of information.
Tens of millions of consumer accounts have been hacked over the past year, exposing email addresses, passwords, account information, health information and financial data.
If you were among the victims, you were probably notified and given the very good advice to change your passwords and monitor your financial statements and credit scores.
I have an odd sense of time when it comes to the internet as we now know it, and if you’re over 40, you probably do too. Time flies. It’s difficult to believe that it’s already been 25 years since the World Wide Web, or the internet, has become such a critical part of our everyday lives.