Browsers give you the option of auto-filling your username and password as a convenience, but convenience usually comes with vulnerability in the cyber world, and this is no exception. There are two scripts used by over one thousand websites to steal your email address and other user identifiers to send to third-party servers to track... Continue reading Web Trackers Exploit Your Browser Credential Manager
Signs You’ve Been Hacked In today’s threat landscape it is a matter of when hackers will gain access to your computer or cell phone, not if. Proper layers of security keep most of the malware out of your system and when malware does make it on your system the impact is reduced by containment, but none of us... Continue reading You’ve Been Hacked – What Should You Do?
The key to securing data is to have positive control of it so only the people that need to access it can and when they need to. Wireless networks pose a challenge to this goal because unlike wired connections wireless networks are reachable for up to 100 feet outside of the home or business. If someone... Continue reading Security Best Practices for Wireless Networks