Safe Apps: How Can You Tell?

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Safe App, Kids safety, kid on Ipad, cybersafe

StandHogg Hits Google Store According to Forbes, Google Android Threats continue to permeate through malware ridden apps that may affect many Android users. Researchers at the Norwegian app security company Promon claim that safe apps can be corrupted through dangerous vulnerabilities. In this particular case, the vulnerability, being dubbed “StrandHogg”, allows dangerous malware to pose … Read more

Emergency Actions After Hacking

Author(s):

Isabell Gaylord, ,

emergency sign in room with red chairs, emergency, hacking metaphor

Hacking has become ubiquitous on the internet. With even major companies like Evernote getting hacked, it’s not hard to imagine that you, an individual, could also get hacked. The experience is actually quite common, though that does not necessarily make it any less distressing. You are left feeling confused, with no idea what you should … Read more

Network Intrusion: How to Detect and Prevent It

Author(s):

Isabell Gaylord, ,

Intrusion, knights attacking laptop, cyber attack metaphor

A network intrusion refers to any forcible or unauthorized activity on a digital network. These unauthorized activities almost always imperil the security of networks and their data. Nowadays, online brands and companies are the usual subjects of these attacks. However, to properly deal with this, organizations should have a cybersecurity team in place. This will … Read more

Social Media Platforms are Vulnerable to Hackers

Author(s):

Frankie Wallace, ,

Social Media Platform Cameras on Computer, Cybersecurity

Did you know that security concerns are turning people away from social media platforms? They are aware that hackers are obtaining users’ personal data through the most commonly visited media sites. If you are on social media platforms in any capacity, you’re probably aware of this fact, and it may have even already happened to … Read more

Tips to Speed up Your Internet

Author(s):

Zehra Ali, ,

Internet Speed, Snail white background

There is nothing more frustrating than sitting on your computer with two programs open as you watch the Spinning Wheel of Death oscillate. We all get irritated when the internet speed is slow. But instead of shouting and breaking your new Macbook, try these tips for increasing the speed of your internet. Why Does Your … Read more

Password Safety: A Comprehensive Guide to Choosing a Good Password

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Password guesses on a notepad. First two are bad passwords and the third one is a more complex password.

Password security is the most basic and ubiquitous form of cybersecurity. Every single account created online has a password attached to it. They predate the internet by hundreds of years and to this day, they remain the most reliable form of user authentication. So why does everybody choose such terrible passwords? What Makes a Password … Read more

How to Keep your PC From Getting a Virus

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

A magnifying glass lays over a PC screen as blue spiked viruses float out of the PC screen.

Stop Replacing your PC Once Every Three Years. It is no secret that PC has a bad reputation. In addition to being viewed as the model that is more likely to receive a virus, PCs are seemingly built to break. According to most companies, when your computer slows down, or behaves unusually, it is simply time … Read more

Understanding Ransomware: A Brief Overview

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Ransomware lock bitcoin

Baltimore, Maryland, Atlanta, Georgia, and South Carolina are three of the recent areas that have been grabbing headlines with reports of ransomware attacks. These attacks range from small hiccups during the business day to dispatch…

Risk Management

Author(s):

Lauren Engelbrecht, Editor, United States Cybersecurity Magazine

Switch button positioned on the word maximum black background and red light. Conceptual image for illustration of high level of risk management.

In 2017, research has averaged the cost of a data breach to be over 7 million dollars. On average it takes an approximated 46 days to resolve a cyber-attack. Regardless of the numbers, it’s…