Filter Posts
“Bring your own device” to work: Is it worth it?
BYOD comes with numerous privacy risks.
Internet Systems Consortium site hacked
This week the Internet Systems Consortium (ISC.org) was hacked and visitors were redirected to a site distributing harmful malware.
Want to watch “The Interview”? Watch out!
By all accounts, “The Interview” isn't that great a film. Rotten Tomatoes has just 61 percent of moviegoers and...
Top 10 security breaches of 2014
That's right folks, it's time. Time for a roundup of the year's worst IT security breaches and how they've...
Encrypted chat apps: Give ’em nothing to talk about
Older unencrypted messaging apps are vulnerable to spying. Apps like Chadder and Telegram can protect your communications.
DuckDuckGo Internet privacy review
DuckDuckGo is a search engine that recognizes and respects your privacy. Read our review on the non-tracking search engine.
Literally malware? The figurative explosion of Uber’s app
The internet is blowing up with discussion over Uber's app, mobile permissions, and what it really means to be malware.
Your data, your rules: The encryption of everything
Who owns your data? The common sense answer is obvious, but isn't always true: in certain situations, law enforcement...
No negotiation: The rising threat of crypto ransomware
We all know the rule – you don’t negotiate with terrorists. When you react to their demands, you prove...
Theft from the skies: Could cell phone data theft affect you?
Recent discoveries have revealed that the NSA has been stealing cellular data right out of the air.