OnePlus Reveals Second Data Breach in Two Years

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

OnePlus

Smartphone manufacturer OnePlus has been the victim of a data breach in which an unauthorized party gained access to customer’s order information. One Plus has released a statement revealing that customer names, contact numbers, emails, and shipping addresses might have been susceptible to theft. However, they have revealed that customer’s payment information, passwords, and accounts … Read more

Location Tracking: A Privacy Concern

Author(s):

Isabell Gaylord, ,

location tracking connecting a phone and a truck for delivery

If you have a cellphone, you’ve probably used location tracking. Indeed, the majority of consumers are carrying a smart device that is consistently sending out private information like location data. However, smartphones are just one of the many smart devices that are transmitting extremely accurate details concerning the user’s activity and whereabouts. This is not … Read more

Smart Cards Security In Biometrics

Author(s):

David Smith, ,

Smart Card Isometric Mobile Phone And Internet Banking. Online Payment Security Transaction Via Credit Card smart cards

Identity and Access Control Smart cards are essential to electronic identity and access management solutions. Indeed, this has been the case for at least 30 years now. Identity and access management can allow or deny access to specific users based on the business needs. Identity cards come in various form factors. This can range from … Read more

Incognito Mode: Are you Really Incognito?

Author(s):

Isabell Gaylord, ,

Incognito Mode

Introduction A lot of people have a wrong impression of Incognito Mode. Some users think this browsing mode covers your tracks completely from anyone, including both other computer users and the government. However, in reality, Incognito Mode is simply a way to keep your browsing history hidden. Additionally, Incognito Mode ensures that you log off … Read more

Why You Should Destroy Your Old Cell Phone

Author(s):

Frankie Wallace, ,

Destroying a Cell Phone with a hammer, Cellphone

Today, just about everyone has a cell phone, with expanded mobile options that have heavily influenced culture in countless ways, from fashion to software development. Moreover, it is common to get a new cell phone every couple of years or so, especially if a newer, better model has come out. However, one area that has … Read more

A Weak VPN Could Be More Destructive Than No VPN

Author(s):

Zehra Ali, ,

Internet to VPN to you

In the present era, an individual’s privacy solely depends on internet security. Your banking details, your pictures, and other sensitive information are available on different channels such as social media accounts, websites, and other online platforms. Therefore, the usage of VPN has increased drastically. But are you sure your VPN is working correctly? If not, … Read more

Facebook Terrorist Propaganda

Author(s):

Ed Alcantara, Chief Cyber Intelligence Officer, BLACKOPS Cyber

thumbs down facebook darknet terrorism terrorist propaganda

Facebook, WhatsApp, YouTube, Google, Twitter, Telegram etc.. have all been alerted (for years) to the enormous amount of extremist propaganda found on their platforms, yet they aren’t compelled to proactively monitor their platforms. Recently,…