Password cracking demo video

Password cracking demo video

Probably the best live demo video I’ve ever seen Quickly illustrates why we never should use short passwords Shows why we need long passwords with letters, numbers and symbols Shows why we should never ever re-use the same password on a different...
65 million Tumblr passwords stolen and up for sale

65 million Tumblr passwords stolen and up for sale

Recently, Tumblr revealed that it had just now discovered a 2013 breach of user email addresses and passwords the total number of compromised accounts is 65,469,298 That puts it in third place in the list of largest data breaches ever recorded, after the 164 million...
Millions of fingerprints have been stolen and posted online

Millions of fingerprints have been stolen and posted online

We should have been ready for this, with all the passwords being leaked in 2015/2016 It affects US Government employees that were part of the OPM hack Fingerprints as you’ll see below are much less secure than we think.   Where are your fingerprints stored?...
How malware works: Anatomy of a drive-by download web attack

How malware works: Anatomy of a drive-by download web attack

Here is a great, visual picture of what happens in less than a second when you visit a malicious web page Infected websites are the number one source of Malware Most of the time, these are legitimate websites that have been compromised to redirect you to another site...
This one chart explains why cybersecurity is so important

This one chart explains why cybersecurity is so important

86% of executives are concerned about cyber threats, including a lack of data security, according to a PricewaterhouseCoopers survey. This chart explains what cybersecurity is, what the investment will be, the top types of attacks, and the ways enterprises are...
Ransomware Seen as Growing Cyber Threat

Ransomware Seen as Growing Cyber Threat

Miscellaneous errors were at fault for 17.7% of breaches, followed by insider and privilege misuse (16.3%) and physical theft and loss (15.1%) Crimeware accounted for 12.4% of intrusions, with phishing attacks picking up dramatically. The median time for the first...
Top 10 Tech Security Basics Every Person Should Follow

Top 10 Tech Security Basics Every Person Should Follow

We talk a lot about computer security and data security but you can never have too many reminders of the basics. Here, in a nutshell, are the security tips and habits every computer user should know. Consider it a quick way to audit your own security or help others...