Tagged: passwords

network security

Ask the Expert: WPA and WPA2 WiFi Networks Are Always Safe, Right?

Q: “My home wifi network uses the WPA (WiFi Protected Access) security protocol, which I’ve always been told is virtually hack-proof. I’m wondering how hard it would be for a dedicated hacker to break into my network. Could a hacker actually do that?”

A: Almost all home wifi networks these days use WPA or WPA2 for their security protocols, which have long been considered to be the best wifi security available.

However, Dan Goodin recently published an article in Ars Technica that detailed how, with the right tools, he was able to crack his neighbor’s WPA protected wifi network. It’s pretty sobering stuff.

But before we get into that, let’s go through a quick primer.

security breach

2012: The Year of Massive Security Breaches

You might have noticed some disturbing security news last week: Yahoo reported that over 450,000 email usernames and passwords were stolen from the company’s databases by hackers and posted on the file-sharing account Pastebin.

Apparently Yahoo had stored these usernames and passwords without any encryption at all, making it very easy for hackers to steal them.

While having one’s email account hacked is bad enough, the news is actually worse than it sounds. Many of the hacked usernames and passwords were identical to those used in other website accounts, such as PayPal or online banking accounts.

Trading on Disaster: How Online Trading Can Lead to Identity Theft

Cybercriminals are stealing user names and passwords so they can access online trading accounts directly. Then they’re using that information to make unauthorized trades, wiring the profits to other banks before their victims notice.  Do you know the tell-tale signs of online trading fraud?  Find out how you can avoid becoming the next identity theft victim when you trade online.


The Obscure, Flawed and Dangerous World of Certificates

Visiting a fake website can have consequences ranging from loss of privacy, to credit card theft, even identity theft. Certificates can be forged, flawed, or stolen. In fact, some security experts say that the Certificate system is “broken” – and there are no remedies on the horizon. How important is that? Well, very important, actually. Because if the Certificate system is no longer fully reliable, then HTTPS, and many other parts of the Internet security system which also use Certificates, are not reliable either. Click the headline above to read more about this alarming development.

Ask the Expert: Is Reusing the Same Password Risky?

In his latest “Ask the Excerpt” installment, CEO Kent Lawson points out why it’s more important than ever to use strong passwords — and also why it’s imperative to change passwords for your various login accounts. Otherwise, you might as well leave your house key under your doormat.

How Hard Is It to Hack Wifi?

CEO Kent Lawson points out how incredibly easy it is for ordinary people to hack WiFi. It doesn’t take any tech expertise — it doesn’t even take a geek — for someone to access your email passwords, logins, and other highly sensitive data. Read on to learn how this is happening — perhaps even to you!

email security

Ask the Expert: Am I At Risk If Stores I Shop At Keep My Email Address on File?

In his latest “Ask the Expert” monthly installment, CEO Kent Lawson discusses ways you can protect your email, password, and other sensitive information in the wake of the recent Epsilon email data breach affecting millions of customer information from retail giants and banks nationwide. Before you click on that so-called legitimate link sent from your “bank,” check out his tips to keep yourself and your family protected!


Mules, Hackers, and Cyberpunks, Oh My: A Step-by-Step Look At How the Dark Side Works

CEO Kent Lawson explores “the dark side” of hackers — a scary reality that many of us choose to ignore. He says many people ask, “Why would any hacker want to steal information from me? I don’t have anything that interesting to steal. I’m sure I’m safe.” Unfortunately, usually the first indication we get that we are a victim of identity theft is when we get our bank statement. Read on for a step-by-step look at how victims — maybe YOU one day — are targeted, as well as security steps to implement NOW!

national ID

Online Privacy: How Do You Feel About a National Internet ID?

The Commerce Department is now tasked with developing an identity management system for individuals on the Internet, and one of the objectives clearly is to facilitate Internet commerce. This week, CEO Kent Lawson writes about the inherent privacy implications of having one master login identity. How do you feel about a national Internet ID?