Why Was Trump’s EO About Federal Cybersecurity and Critical Infrastructure Deleted?
By Jeff Thompson Back in 2018, The Organic Prepper posted a piece on how to make your own Faraday cage – a device to protect…
By Jeff Thompson Back in 2018, The Organic Prepper posted a piece on how to make your own Faraday cage – a device to protect…
By B.N. Frank Most businesses want to generate as much profit as possible. That’s always been true. Data collection can be very profitable – sometimes…
By Helena Sutan A new ‘apocalyptic’ cyber attack could wipe out the Internet, putting NASA, televisions, and Minecraft at risk. The ‘worst-ever’ Internet security flaw…
By Alexis Hancock If a proposal currently before the European Parliament and Council passes, the security of HTTPS in your browser may get a lot…
By Kennedy Hall Israel led a 10-country initiative earlier this month that simulated a global financial cyber attack aimed at creating a real-life scenario that…
By Tyler Durden Preliminary reports from Pingdom AB, a Swedish website monitoring company, show more than 63,000 websites are experiencing issues worldwide. At the same…
By B.N. Frank In 2020, utility companies and associations filed lawsuits against the Federal Communications Commission (FCC) for not protecting utility infrastructure from potential electrical…
By B.N. Frank Downloading “free” apps onto devices more often than not allows app providers to collect personal data on users. Of course, companies that…
By Tyler Durden Apple AirTags is a great tracking device for when you lose your wallet or backpack. But thieves in Canada use the devices…
By B.N. Frank Experts have been warning for years about security risks associated with Bluetooth and Wi-Fi, Internet of Things (IoT) technology, and various IoT/Smart…
By B.N. Frank Wireless wearables (activity trackers/watches, ear phones, hearing aids, rings, Virtual Reality (VR) goggles, etc.) utilize Bluetooth and/or Wi-Fi technologies. Security experts have…
By B.N. Frank Wireless wearables are notorious for their capability of being privacy invasive (see 1, 2, 3, 4). Ditto on other wirelessly connected (aka…
By B.N. Frank Does it seem like “the new normal” includes cyberattacks, risks, threats, and vulnerabilities being reported every single day (see 1, 2, 3,…
By B.N. Frank Hardwired Ethernet connections are safer, more reliable, and more secure than wireless (Wi-Fi) connections. In fact, experts have been warning for years…