Tagged: Hacking Threats

Hacking Small Businesses Is Big Business for Cybercriminals

Hack attacks against corporate giants like Sony, Citibank and Google  continue grab the headlines. But surprisingly, it’s small and medium sized businesses that are fast becoming cybercriminals’ favorite targets. If you’re a business owner, make it your business to find out how protect your company from digital data thieves.



How Thieves Use Facebook

It was only a matter of time before Facebook was penetrated by thieves ready to exploit the popular network for their own gain.   There are a few ways that thieves obtain information through Facebook which if consumers are aware of, they are much more likely to be able to protect themselves.

digital information

Distressingly Fragile: Digital Information and Things That We Trust That We Shouldn’t

It might sound crazy, but it’s actually rather simple for some cyberpunk to drive to where you live or work, park out front, and put up cellphone antenna aimed at your home or office to hack your cell phone conversations, text messages, even emails. Think it’s not so simple? Think again, says CEO Kent Lawson, in this special post from May that we’re publishing again as part of our “Best of…” series. Click above to read all of Kent’s thoughts on a few “distressingly fragile” mobile trends you need to know about.

Ask the Expert: Is Reusing the Same Password Risky?

In his latest “Ask the Excerpt” installment, CEO Kent Lawson points out why it’s more important than ever to use strong passwords — and also why it’s imperative to change passwords for your various login accounts. Otherwise, you might as well leave your house key under your doormat.

How Hard Is It to Hack Wifi?

CEO Kent Lawson points out how incredibly easy it is for ordinary people to hack WiFi. It doesn’t take any tech expertise — it doesn’t even take a geek — for someone to access your email passwords, logins, and other highly sensitive data. Read on to learn how this is happening — perhaps even to you!

video chat

Hey…Watch This: The Dangers of Video Chat and How to Protect Yourself

It is astounding when we sit back and think about just how far communication has come in recent history. While many can remember only having the option of a letter or a phone call, these days there is a plethora of ways to engage each other. Distance and cost are not as much of a concern with the integration of communication services through the internet. However, with the ease of sharing our private lives with friends and acquaintances, comes risk.

Evil Twins: The Dark Side of Using Wifi Hotspots

If you think Evil Twins sound like something out of a B Sci Fi movie, think again. They’re more likely to be lurking near your laptop at a public WiFi hotspot. Find out how to avoid becoming a victim.

airport wifi

Airports and Identity Theft: Staying Safer While On The Road

Airports can be dangerous because they provide a great venue for identity thieves to engage in their crimes. Luggage transfer, public WiFi and a chaotic environment all leave travelers open to becoming victims of identity theft. Read on to learn more about the identity theft risks inherent in airport travel today, and ways you can avoid becoming a victim.

hotel wifi

Ask the Expert: Is It Safe For Me to Use Hotel Wifi?

In his latest Ask the Expert column, CEO Kent Lawson points out that most hotel networks are completely unsecured. Read more to discover why the risks associated with using a hotel network — whether wired or wirelessly — are much greater than using a wireless network at your home or office, and some simple steps you can take to protect yourself today.

Seven Wifi Myths We Live and Die By

When it comes to WiFi security, urban legends about how to outsmart hackers are spreading faster than we can connect to the wireless Web. If you don’t want to fall victim to any of them, find out how what’s safe to do on WiFi and what’s not.

How Cyberpunks Hack Wifi Hotspots

Think hacking is difficult? Think again. CEO Kent Lawson outlines the two basic ways that cyberpunks can snoop on your online activities and explains why security experts (and even most WiFi hotspot Terms and Conditions) urge consumers to use a Virtual Private Network to secure their Internet communications.