When it comes to our security, we have to weigh the need for security and connectivity and make the most informed choices that will protect our data, devices, and privacy.
Passwords are necessary, complex, shared, written down, forgotten, lost, and despised. What is legal, safe, and smart?
What access permissions have you given others to your phone and the data contained within it?
We are at a time when your phone is your kingdom, and you would be wise to erect a mote to keep out marauders.
With the summer travel season in full swing and the current state of our world it is wise to be prepared for problems,which brings us to a tip I read some time ago and have had in practice since then with minor adjustments for changing technology and environments.
The past few weeks brought news of a rush of new hacks and old ones brought back to light. We saw LinkedIn, Tumbler, and Twitter with breaches in the tens of millions of accounts. We saw major celebrities get hacked from Mark Zuckerberg and Lana Del Rey, Katy Perry, the NFL, and DeRay Mckesson.
With these unpredictable acts of nature we have seen of late I thought I would talk about how we can prepare our digital lives for some of the more unforeseeable events.
It is your right to have a browser that does not run Flash at all (Firefox), and to not be indexed and branded.
As we mature and have dependents that count on us, we need to consider how they depend on us and how we can plan for our future and theirs.
Flash has outlived its safe and useful existence and should be used with extreme caution.
With the amount of information we store on our computers and phones, and the cost of storage, how can we not consider having a good backup system in place.
When you think about all of the accounts we have online and the number of information leaks, think about how often you reuse the same username or worse, password.
Encryption; its use, weaknesses, and the stigma that gets attached by those that do not understand its intrinsic value is forefront in the news and my mind.
This week I want you to think about how vulnerable you are when you are in public. When you go to a restaurant, bar, or even a class, think about what others are looking at and noticing.
Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email.
Everything you share should be planned out and not be compromising to your privacy and security if you can help it.
A DNS-based Blackhole List (DNSBL) or Real-time Blackhole List (RBL) is an effort to stop email spamming. It is a “blacklist” of locations on the Internet reputed to send email spam.
Email spoofing is the creation of email messages with a forged sender address. It is easy to do because the core protocols do not have any mechanism for authentication. Spam and phishing emails typically use such spoofing to mislead the recipient about the origin of the message.
Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email validation system designed to detect and prevent email spoofing.
DomainKeys Identified Mail (DKIM) is an email authentication method designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain is authorized by that domain’s administrators.
Sender Policy Framework (SPF) is a simple email-validation system designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain comes from a host authorized by that domain’s administrators.
All business be they physical or virtual want to know who their customers are and how they shop. This is evident by the abundance of membership cards, signup sheets, and surveys conducted after a purchase.
The number of hands that touch and see your luggage is immense and letting them know you are out of town and where you live is inviting trouble.