Seasoned writer with a demonstrated history working in areas of information security, digital rights, and education. Skilled in content curation, research, curriculum development, editing, and history. Strong media, marketing, and communications professional with an MA in Education and a BA in from the University of California, Berkeley. Find her on Twitter: @jennjeffers3

These 6 Ways Say Improving Your Android’s Security Is A Snap

Mobile security is at the top of every company’s worry list these days. Nearly all workers now routinely access corporate data from smartphones, and that means keeping sensitive information out of the wrong hands is getting harder and harder for most mobile users. And as a huge number of people continue to access data thru

[ Read More ]

Europe Union Strengthens Policies Over Data Protection

The Internet holds most of the consumer’s data. When a consumer decided to log-in all of his information on his smartphone or laptop, several other devices, social media, banks, or the government (also known as entities) can acquire his/her private information. To both public or private entities, the consumer’s information can be exposed. In many

[ Read More ]

Common Cryptocurrency Problems and How to Prevent Them

Cryptocurrency are considered to be the same as electronic money. It means that they also have the same problems as classic e-payment systems. The operating principles specific to cryptocurrencies sometimes make the problems more likely to occur, and thus more alarming. Moreover, the same principles are responsible for a certain number of risks unique to

[ Read More ]

How To Defend Yourself From New Cryptocurrency Malware

New malware have been discovered in the cryptocurrency world. Based from a blog post by Radware, reports about a discovery by cybersecurity researchers. Cybercriminals are able to abuse a Chrome plugin named “Nigelify” with a malware code in order to steal personal information and secretly mine cryptocurrency. The Chrome extension is able to bypass Google’s

[ Read More ]

New Cyber Security Strategies For Government Institutions

The government faces threats from a growing set of sophisticated malicious personalities who seek to exploit cyberspace. It includes espionage, political and ideological interests and financial gain. In one of the report of US Department of Homeland Security dated May 15, 2018, intrusions in one of the federal agency resulted in the compromise of personnel

[ Read More ]

Strengthen Your Email Security With These Tips

After his team of computer security researchers from the IT Security Lab of Munster University in Germany discovered a set of vulnerabilities on software PGP (Pretty Good Privacy) and S/MIME (Secure/Multipurpose Internet Mail Extensions), professor Sabastian Schinzel warned the users of those encryption applications to immediately disable and delete them. Schinzel’s research group dubbed the

[ Read More ]

Here’s How To Keep Your Routers Protected From Hackers

In light of the current geopolitical strife surrounding Syria, authorities in both the US and the UK have alerted their citizens that Russian hackers are on a campaign to take over routers and network devices in their respective countries. The FBI, Department of Homeland Security, and the UK National Cyber Security Centre have issued a

[ Read More ]

Hackers Steal Millions From Mexican Banks By Targeting Payment Systems

Mexico’s central bank Governor Alejandro Diaz de Leon told journalists late Monday that the attack on the payment system was unprecedented and that he hoped that measures being taken would stop future incidents. Hackers have managed to get away with hundreds of millions of pesos from leading Mexican banks by targeting the payment systems. Reuters

[ Read More ]

This Ransomware Went From Stealing Passwords To Hijacking PCs

An interesting piece of news- a malicious website which was in fact set up to make visitors pay a cryptocurrency ransom has now reportedly changed its course. Now, instead of asking for a ransom, the malicious website hijacks your system’s processing power and does cryptocurrency mining, in the background. This malicious website was designed as

[ Read More ]

Why Spending Billions Still Hasn’t Protected Web Applications

A recent study report points out that 100 percent of web applications are vulnerable to attack, despite billions that companies would spend on cybersecurity efforts. Trustwave’s eleventh annual Global Security Report, released last week, says that in 2018 companies would be spending an estimated $96 billion on cybersecurity efforts, but 100 percent of web applications

[ Read More ]