Recently, Robert Grimes published an article on InfoWorld that detailed the most likely reasons that we end up being a target for hackers. Click to find out the top four reasons he identified — and learn the top ways to keep your sensitive online information safe and avoid becoming a victim of a hacker.
Q: “My home wifi network uses the WPA (WiFi Protected Access) security protocol, which I’ve always been told is virtually hack-proof. I’m wondering how hard it would be for a dedicated hacker to break into my network. Could a hacker actually do that?”
A: Almost all home wifi networks these days use WPA or WPA2 for their security protocols, which have long been considered to be the best wifi security available.
However, Dan Goodin recently published an article in Ars Technica that detailed how, with the right tools, he was able to crack his neighbor’s WPA protected wifi network. It’s pretty sobering stuff.
But before we get into that, let’s go through a quick primer.
You might have noticed some disturbing security news last week: Yahoo reported that over 450,000 email usernames and passwords were stolen from the company’s databases by hackers and posted on the file-sharing account Pastebin.
Apparently Yahoo had stored these usernames and passwords without any encryption at all, making it very easy for hackers to steal them.
While having one’s email account hacked is bad enough, the news is actually worse than it sounds. Many of the hacked usernames and passwords were identical to those used in other website accounts, such as PayPal or online banking accounts.
Cybercriminals are stealing user names and passwords so they can access online trading accounts directly. Then they’re using that information to make unauthorized trades, wiring the profits to other banks before their victims notice. Do you know the tell-tale signs of online trading fraud? Find out how you can avoid becoming the next identity theft victim when you trade online.
From “password” to “letmein” to “123456,” this list of the 25 worst passwords of 2011 by The Huffington Post’s Ramona...
Visiting a fake website can have consequences ranging from loss of privacy, to credit card theft, even identity theft. Certificates can be forged, flawed, or stolen. In fact, some security experts say that the Certificate system is “broken” – and there are no remedies on the horizon. How important is that? Well, very important, actually. Because if the Certificate system is no longer fully reliable, then HTTPS, and many other parts of the Internet security system which also use Certificates, are not reliable either. Click the headline above to read more about this alarming development.
In his latest “Ask the Excerpt” installment, CEO Kent Lawson points out why it’s more important than ever to use strong passwords — and also why it’s imperative to change passwords for your various login accounts. Otherwise, you might as well leave your house key under your doormat.
CEO Kent Lawson points out how incredibly easy it is for ordinary people to hack WiFi. It doesn’t take any tech expertise — it doesn’t even take a geek — for someone to access your email passwords, logins, and other highly sensitive data. Read on to learn how this is happening — perhaps even to you!
There was a time when a letter had to have a stamp on it in order to get anywhere. Then...
In his latest “Ask the Expert” monthly installment, CEO Kent Lawson discusses ways you can protect your email, password, and other sensitive information in the wake of the recent Epsilon email data breach affecting millions of customer information from retail giants and banks nationwide. Before you click on that so-called legitimate link sent from your “bank,” check out his tips to keep yourself and your family protected!
CEO Kent Lawson explores “the dark side” of hackers — a scary reality that many of us choose to ignore. He says many people ask, “Why would any hacker want to steal information from me? I don’t have anything that interesting to steal. I’m sure I’m safe.” Unfortunately, usually the first indication we get that we are a victim of identity theft is when we get our bank statement. Read on for a step-by-step look at how victims — maybe YOU one day — are targeted, as well as security steps to implement NOW!
The Commerce Department is now tasked with developing an identity management system for individuals on the Internet, and one of the objectives clearly is to facilitate Internet commerce. This week, CEO Kent Lawson writes about the inherent privacy implications of having one master login identity. How do you feel about a national Internet ID?