Never Trust a Key Card
Key cards are not as secure as you think… They’re the target of a super-simple new hack that allows criminals to get into your hotel room or office in under 60 seconds. Here’s how to protect yourself.
Key cards are not as secure as you think… They’re the target of a super-simple new hack that allows criminals to get into your hotel room or office in under 60 seconds. Here’s how to protect yourself.
A new email scam has emerged, and the scariest part is who the sender appears to be. Here are some things you should do immediately if you’ve downloaded a suspicious file or think you may have been targeted by phishers.
Consider how many accounts your cellphone number is associated with. Now imagine a cybercriminal getting their hands on all the information in those accounts just by having your phone number. Scary, isn’t it? Well, here are five steps you can take to prevent having your cellphone number compromised.
It’s no secret I’m not a fan of using social media. But if you don’t want to deactivate your accounts, at least take a look at this week’s first reader question for some social media safety tips you should start implementing today.
What happens if the next cyberattack takes down our financial system? Would you still be able to provide for your family? If your answer is no — or even a tentative yes — take a look at today’s first must-read article.
Last week, a new phishing scam swept the internet. This week, retail stocks may come crashing down, taking the rest of the markets with them. And next week, warmer temperatures mean mosquitos will start bringing their deadly diseases to a backyard near you. This week’s batch of must-read articles addresses each of these threats and more.
Internet privacy regulations are on the chopping block this week, which means it’s more important than ever to do whatever you possibly can to protect your personal data.
Wi-Fi is great. It’s convenient, allows for widespread coverage, increases the portability of devices and is cost-effective. But wireless networks — especially in your home — are also a common target for hackers trying to steal your personal information. To protect your wireless network from unauthorized access, simply follow these three steps.
Most people don’t realize one of the most vulnerable points of any retail transaction is the moment you check out. Avoid becoming a victim of a point-of-sale attack with these tips.