Privacy and Security News and Tips 20160223
The number of hands that touch and see your luggage is immense and letting them know you are out of town and where you live is inviting trouble.
The number of hands that touch and see your luggage is immense and letting them know you are out of town and where you live is inviting trouble.
Phishing is a scam where Internet fraudsters send spam or pop-up messages to lure unsuspecting victims into providing passphrases, personal, and/or financial information.
In computer security, social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking or manipulating other people to divulge confidential information or break normal security procedures.
Phishing scams are crude social engineering tools designed to induce panic in the reader. These scams attempt to trick recipients into responding or clicking immediately, by claiming they will lose something.
While the process of encrypting information is nothing new, encryption technologies are a hot topic in IT recently — with good reason. This article hopes to explain the various types of encryption as used regularly by IT pros.
Think of a passphrase vault as being similar to a bank vault; only with the vault combination (passphrase) can you unlock the protected items inside (other passphrases).
The first and most common piece of security everyone is aware of and using is a password or hopefully a passphrase.
Recently I was at a conference and the subject of computer and Internet security came up. That, coupled with all that has been in the news lately, helped me decide to do a series of posts covering some of my general security suggestions.