Web Trackers Exploit Browser

Web Trackers Exploit Your Browser Credential Manager

Browsers give you the option of auto-filling your username and password as a convenience, but convenience usually comes with vulnerability in the cyber world, and this is no exception. There are two scripts used by over one thousand websites to steal your email address and other user identifiers to send to third-party servers to track you.

Site owners are using one of two scripts that are an invisible login form that recognizes that your browser is using auto-fill. (more…)

Keyboard Maker AI.Type Latest Data Breach

Recently there has been a massive data breach that exposed millions of people. Upon installing the Ai.Type keyboard the application requested full access to your phone which recorded every letter or number you typed. Why would a keyboard and emoji application need to gather the entire data of the user’s phone or tablet? Great question. (more…)

dark web vs deep web

The Deep Web vs. The Dark Web

The Deep Web

The deep web is commonly known as the invisible web or the hidden web. The deep web is surprisingly large taking up 90% of the internet which is estimated to be 7.5 petabytes which most of that is made up of innocent content such as emails, logins, and subscription websites; generally, anything that requires a login will be stored on the deep web. 

The deep web contains over 90% of the information on the internet but is not able to be accessed by surface web users. (more…)

hacker email

What Can a Hacker Do With Your Email Address?

Email might seem trivial to some people, but if you are active in using the internet to bank, shop, conduct research, ship items, sell items at auction, and a myriad of other activities your life revolves around email. If a hacker were able to take over your email account they could reset passwords to all of your online accounts and determine what your security question answers are based on the interests the hacker would discover in the content of your emails. It’s important to have application based two-factor authentication, not email or SMS (text message). If you are unsure about what you should do in the event your email account is taken over by a hacker, check here. (more…)