Tagged: Cloud Security

Will WiFi Replace Cable and Fiber Networks?

In a recent blog post, we mentioned that the next generation of WiFi technology will be much faster, and that by 2018, worldwide WiFi traffic will overtake wired traffic for the first time ever.

Now see how one Silicon Valley company plans to bring high-speed WiFi networks to underdeveloped parts of the U.S. as well as developing countries.

That Shared Family Tablet Could End Up Costing You Plenty

Consumers love their tablets. Their big touch screens and extreme portability make them ideal for browsing, apps, email, and a host of other online activities. So it’s not surprising that over half of users say tablets are their favorite device, according to Adobe data.

Unfortunately, tablets are also the favorite device of identity thieves, who love to hack them.

360 Million Account Credentials for Sale on Black Market

The security firm Hold Security LLC has just released an explosive report which states that login credentials for some 360 million accounts are currently being offered for sale on cyber black markets.

The sheer number of stolen account has security experts shocked. If true, it would be the biggest single data breach in history.

My Generation: Views on Security Differ By Age Group

Our CEO, Kent Lawson, was (infamously!) at last week’s RSA security conference in San Francisco. He said that one of the more interesting presentations had to do with the differences among generations in regards to their online security. This presentation contained survey information from ZoneAlarm, an online security company.

Mobile First, Cloud First: What Does This Tech Philosophy Mean for Your Online Privacy?

What does “mobile first, cloud first” mean for your online privacy? Mobile devices will get increasingly fast and easy to use. Security is going to be paramount given the threats with all this information being in the cloud. Information leakage on the cloud or exposure to hackers is still a very big threat without the use of a personal VPN. Find out what emerging mobile philosophies might be explored at next week’s Mobile World Congress in Barcelona and how it affects your online privacy.

Federal Charges Against ‘Revenge Porn King’ for Hacking, Identity Theft Highlight Email Insecurity

Hunter Moore, the California man who became infamous for operating the “revenge porn” website IsAnyoneUp.com, was recently indicted on charges of stealing nude photos from hacked email accounts and posting them online. Moore, 27, and his alleged accomplice, Charles “Gary” Evens, 25, were charged with conspiracy, unauthorized access to a protected computer, and identity theft. What the two men are accused of highlights just how easy it can be to hack into email accounts and steal sensitive information. The results can be devastating for the victims.

Federal Workers Are Not Protecting Their Mobile Devices

More than 40 percent of government employees are putting themselves and their agencies at risk with their mobile device habits, according to Cisco and the Mobile Work Exchange’s report “The 2014 Mobilometer Tracker: Mobility, Security, and the Pressure In Between.” As part of the study, an assessment tool called the Secure Mobilometer was developed to understand mobile (in)security and vulnerabilities.  The tool provided insight into the mobile device habits of government agency employees. The results show one singular truth: government employees and agencies need to take significant steps to secure confidential data.

The EFF Has Your Back

The tide is changing online, and companies need to make a commitment to users that their information is just that, theirs. Helping with this promise is the Electronic Frontier Foundation (EFF).  They have released an annual report titled, “Who Has Your Back?” taking a closer look at the privacy policies of major Internet companies. Read on to learn which companies are protecting your privacy.