Prepare to be amazed in the Putting the “Why” in Wi-Fi Security webinar. With Wi-Fi vulnerabilities like the “Evil Twin” access point making global headlines, it's not just about Wi-Fi connectivity anymore—security needs to come first. Wi-Fi security is a complicated technology area, and security-related messaging coming from many vendors creates more confusion than … [Read more...]
May the 4th be with you – Yoda’s Wisdom and Infosec Tips
Greetings and happy Star Wars Day, infosec enthusiasts! Whenever May 4th rolls around, we collectively celebrate our favorite Star Wars movies, characters and moments. But, what can we learn from this beloved space opera universe that might help us better secure ourselves and our businesses? To answer this question, we decided to put together a video series that examines famous … [Read more...]
What You Need to Know about Facebook’s Privacy Settings in the Wake of the Cambridge Analytica Scandal
Yesterday, Facebook CEO Mark Zuckerberg testified for a joint hearing of two Senate committees about the Cambridge Analytica scandal and Facebook’s data privacy practices. Over 40 senators questioned Zuckerberg for more than five hours, but if you’re a Facebook user, you’re probably most interested in one question: “Am I one of the 87 million people whose personal information … [Read more...]
Facebook, Privacy, and You
When you log in to Facebook this week, you may be greeted by a notification in your news feed titled “Protecting Your Information.” If you see one of these notifications, you may be among the potential 87 million users whose personal information was harvested from Facebook by Cambridge Analytica, a political consulting firm hired by President Trump’s 2016 election campaign. … [Read more...]
When Big Tech Leave Open Access
Tesla is known not just as a car company but as a technology company, as is evident by their heavy presence in Amazon AWS. Hackers recently took advantage of this reliance on tech by gaining access to and using Tesla’s AWS account to run their own cryptocurrency mining operation. According to a recent report from RedLock, hackers gained access to a Tesla management console, … [Read more...]