Get in Touch
Does Anyone REALLY Know the Difference Between a Data Breach, Compromise, Leak or a Breach of Trust?
By Eva Velasquez, Identity Theft Resource Center CEO and President
Do you? Currently and depending on who is speaking, there are varying and frequently opposing...
By and large, HTTPS—the encrypted form of delivering websites – has proven to be a very effective mechanism for assuring the legitimacy of websites,...
Google’s email platform has more than a billion active monthly users as of the last count in February 2016, which is why the recent...
With all of the headlines about potential vulnerabilities and hacks through IoT-enabled devices, there’s a much more prevalent way to get got.
The inherent...
It doesn’t matter how many times you tell employees not to share passwords. A new study suggests many people are still going to do...
KnowB4’s chief hacking officer Kevin Mitnick released a video that should send shudders down the spine of anyone using 2-factor authentication.
Implementing a standard attack...
The FBI has advised owners of internet routers worldwide to reboot their devices in order to disrupt and help better identify a malware-driven botnet...
You know the what digital transformation is, even if you haven't heard the term before (hint: it's been happening since the late 1990s). Yes, that digital transformation.
To be...
At least four Chinese manufacturers had unfettered access to Facebook’s user data, thus joining the ranks of Cambridge Analytica, Blackberry, Apple, Amazon, Samsung and...
Assuming this is not a case where other shoes will be dropping with the thud of carefully manipulated damage control, MyHeritage did everything right....