Join the IT Specialist Breach Prevention Program 

Start with a Free Dark Web Scan and Baseline Security Assessment. Your Protection is on Us!

Tech Insights

rss

Contributor Columns on Information Technology and Security

It’s all about code—the building blocks of the Internet. Software code is full of unintentional defects. Governments are paying heavy prices to skilled hackers who can unearth these vulnerabilities, says an article at nytimes.com. In fact, the FBI director, James B. Comey, recommended that the FBI pay hackers a whopping ...

A crook can steal your identity by taking control of your wireless phone account—by pretending to be you in person at the mobile store. The villain can then buy pricey mobiles and sell them—and guess who gets the bill but not the profit. Symptoms of Hijacked Account Suddenly losing service ...

The days of using a computer to access your bank account, using a password, may be coming to an end, to be replaced entirely (as some experts believe) with a fingerprint or face scan using a smartphone. The smartphone employment of such biometrics will drastically reduce hacking incidents, but will ...

If you have a strong password for your Amazon account, you may still want to consider beefing up the security with two-factor verification (or authentication), which will prevent a thief from accessing your account (which is possible if he gets ahold of your password and username somehow). Log onto ...

Late last month, nearly 200 million Yahoo email accounts went up for sale on the dark web at a pretty nominal cost of just 3 bitcoins (just over $1700). The dump, which contains the usernames, passwords, date of birth as well as alternate IDs of millions of still-active users, ...