App Access: Life Invasion

Author(s):

Josh Henry, ,

Guy in front off computer with app access

Life Invasion: Your Privacy A problem that has been occurring for years is finally generating concern. 77% of Americans own smart phones. Majority of those people make the mistake of allowing apps such as Facebook to gain access to their camera roll. It all seems innocent until your private photos start trending and get into … Read more

The Netflix Sharing Problem

Author(s):

Zia Hayat, CEO, Callsign

Red Head Woman watching Netflix on her Smart TV, Watching Daredevil, Options on the Bottom of TV like Daredevil, Black Mirror, Peaky BLinders, Glitch, The Crown, etc.

Netflix Has a Problem With Password Sharing. We have all heard the story of the college grad using his former roommate’s parents’ Netflix password. We all know the ex-boyfriend binging his favorite shows with his ex-girlfriend’s account credentials. Many consider the sharing economy a positive thing. However, Netflix, Hulu, Amazon, HBO and others are literally … Read more

The Dark Side of AI

Author(s):

Josh Henry, ,

AI The Dark Side of AI, Artificial Intelligence, AI concept, Brain on motherboard

The rise of AI is as inevitable as the next data breach.  The 21st century has seen a massive resurgence in highly advanced AI usage techniques. We can now process large amounts of data in a short amount of time. We can use machine learning to help machines improve on their mistakes. In fact, we … Read more

The Top 5 Cybersecurity Myths That Need to Die

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Cybersecurity Myths Man in Suit Looking at a White Wall With Two Direction Arrows Pointed To Fact or Myths

Cybersecurity myths are pervasive ideas people have about cybersecurity that weaken your cybersecurity posture. These myths often are defense mechanisms, rationalizations for apathy and inaction. It is important to dispel these myths. Otherwise, you could be opening yourself, or your business, to vulnerability. Cybersecurity Myth #1: Cybersecurity is the IT Guy’s Problem If you work … Read more

Equifax was Careless With Your Data

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Josh Henry, ,

Data breach and private personal information theft as a technology security concept as a digital thief stealing code as a computing risk idea in a 3D illustration style. Equifax

The Cost of Carelessness Is it possible to quantify carelessness? Recent news about Equifax has shown the veracity of carelessness seen in the cybersecurity department of major corporations and countries. This year alone, we have seen many companies that we trust with our personal information fail us. Because of this, the catastrophic failures of cybersecurity … Read more

What is a Hacktivist?

Author(s):

Patrick Putman, ,

Anonymous Hacktivist Mask

Hacking is no longer just about breaking into a computer to steal money or data. Hackers have developed new methods of influencing policy and bringing about change. Especially with society’s heightened sense of political awareness. Subsequently, they are turning internet activism as a way of spreading their idealism. Simply put, a hacktivist is someone who … Read more

CAA Record: A Small Step Towards a Safer Internet

Author(s):

Paul Baka, ,

CAA Records Metadata

A Case of Misplaced Trust A lot of trust is placed in certificate authorities. SSL/TLS on its’ own protects against a malicious actors. It does this by intercepting communications. However, certificate authorities do nothing to prevent sending data to someone who has found a way to route client traffic to a copycat website. Certificate Authorities … Read more

Always Read the Privacy Policy for Your VPN

Author(s):

Obaid Chawla, ,

Privacy Policy Ipad terms and conditions on a table arrangement coffee laptop keyboard

You Didn’t Read the Privacy Policy?! The privacy policy is the single most important document governing the guidelines around which a VPN functions. However, it has almost become a ritual to not read it. Everyone knows that it’s there but no one actually reads it, except for a few cybersecurity geeks and VPN reviewers. Unfortunately, … Read more

Cybersecurity Market: Trending Upwards

Author(s):

Josh Henry, ,

Cybersecurity Market coins in front of graph

Rising Cybersecurity Market Trends      The cybersecurity market is rapidly expanding in today’s society; and rightfully so. The steady increase in data breaches and threats to our identities show no signs of slowing down. Additionally, the demand for professionals in the cybersecurity market field is rapidly growing According to an article from Cybersecurity Ventures, the estimated … Read more