More from Timothy Noke
Key Considerations for Consumers Around Data Privacy
It’s 2018 – and though we’re not living in the age of flying cars, we are living in an age defined by the digital lifestyle. In today’s new age of technology, consumers are sharing more online than ever before. But, are people thinking about the privacy they sacrifice when they ...
Meltdown and Spectre 101: What to Know About the New Exploits
Between the Blueborne vulnerabilities and the High Sierra Mac flaw – we saw some nasty bugs in 2017. Now, 2018 has already introduced us to some powerful new exploits: Meltdown and Spectre. These are cyber-attack techniques that seek to exploit operating system technologies that normally function safely, as designed, but ...
PayPal Users: Here’s What You Need to Know About the New Phishing Scam
It’s the season of giving, which means internet scams are practically everywhere, as cybercriminals are trying to trick eager holiday shoppers. So, it’s unsurprising that yet another scam has emerged, this time targeting millions of PayPal users with manipulative phishing emails. The emails, which are intended to look like they’re from ...
The Uber Data Breach: What Consumers Need to Know
Ride-sharing apps are one of the most successful innovations of the modern digital age. Practically everyone who has a smart phone uses them. When it was discovered today that Uber, the leader in the ride-sharing space, was hit with a massive data breach back in 2016, all of our ears ...
A Cybersecurity Carol: Key Takeaways From This Year’s Most Hackable Holiday Gifts
A classic holiday story is A Christmas Carol by Charles Dickens, which tells the tale of how a grumpy man learns from his mistakes, as guided by the Ghosts of Christmas Past, Present and Future. Funny enough, our most Hackable Gifts Campaign resembles this tale, as there are lessons we’ve ...
The Top 5 Scariest Mobile Threats
Halloween has to be one of my favorite holidays of the year. Creative costumes, buckets of candy, and pumpkin spice lattes make All Hallows’ Eve a memorable event for people of all ages. But what I love most about Halloween is the traditions associated with it: pumpkin carving, trick or ...
How KRACK Threatens Wi-Fi’s Security Underpinnings and What It Means for You
If you grew up before, or even during the 90s, you were familiar with a world of cords. A cord for the telephone, a cord for the CD player and a cord — of course — for the internet. But around the late 80s and early 90s, things started to ...
5 Tips for Avoiding Android Malware
The ubiquity of mobile phones has created a unique opportunity for cybercriminals. They now have a way of accessing both our money and personal information without us realizing it by distributing risky apps that we often willingly download. Many of the most dangerous apps target Android devices, and there are ...
Are You Unhackable?
Working in cybersecurity doesn’t make you immune to hackers, but it sure does make you more aware and more prepared. One of the biggest things to remember is to always be skeptical. Skeptical of strange email addresses, random friend requests, unfamiliar Wi-Fi networks…everything. Learn the signs to look for and ...
Catch Phish If You Can
There are some movies you can watch over and over again. For me, it’s “Catch Me If You Can,” Steven Spielberg’s 2002 crime film based on the life of con artist, Frank Abagnale. Abagnale, portrayed by Leonardo DiCaprio, poses as a variety of professions (a pilot, a doctor, and a ...
- 1
- 2