Who’s the Hacker?

Before the era of cybercrime, hacking for social, political, or religious causes (so-called hacktivism), and terrorist threats to our infrastructure and monetary systems, the hacker started as an explorer and traveler on the data superhighway. Today, we can still categorize some hackers as explorers. In fact, the title “hacker” carried the pejorative meaning only recently.

Read more

Security Tips through the Lens of an IP Camera

IP cameras are remote access still and/or video cameras that enable remote monitoring of whatever is in the camera’s view. They have become very popular in recent years as an inexpensive security system. However, several serious security breaches of these devices should make us think twice before installing our own systems.

Read more

The Click That Changed Emily’s Business

As you may recall from Part I of this series, Emily is the sole owner of a small business. Like many computer users, she has heard a little about the need to keep information secure—especially customer information—so she uses a free antivirus software program. But, there’s more to protecting data than that.

Read more

Social Media Users Beware: Two Million Accounts Compromised

A recent CNN headline read, “2 million Facebook, Gmail and Twitter passwords stolen in massive hack.” This attack began sometime in October 2013 and was discovered in late November 2013 by Trustwave, a cybersecurity company. How this occurred is still being investigated. What is known is that the users who were compromised had been infected with a keylogger virus. This virus enables hackers to collect every keystroke typed on the user’s computer, including passwords, account numbers, and anything else you enter.

Read more