average face of a hacker header 2
25 Jan 2015

Hackers Unmasked: If “Anonymous” Had A Face, This Would Be It.

From the massive release of private celebrity photos (which the internet dubbed “The Fappening”) to the North Korean Sony attacks, 2014 was a year of notable “hacking” activity. Events like these have created a call to action for increased security measures across the board, especially as data protection continues to

info@securethoughts.com' 0
02 Jan 2015

The NSA’s Conflicted Battle with Encryption

It’s no secret the intelligence agencies of the world spend a great amount of time trying to break  the many different codes and encryption types available today.  The NSA has their fair share of success stories in this area.  But, as the Edward Snowden leak showed, there are still some

ID Theft
24 Dec 2014

Protect Yourself from Identity Theft

Protect Yourself from Identity Theft Identity theft is a serious problem with significant consequences for victims. Based on public statistics available online, 15 million people in the U.S. are victims of identity theft each year, with financial losses totaling 50 billion dollars. If those statistics provided you a wake-up call,

online-shopping 1000x400
08 Dec 2014

How to protect your information when shopping online over the holidays

Yes, it’s that time of year again – the holidays.  At or near the top of most people’s to-do lists during the holidays is finding the perfect give for a loved one or friend.  Businesses do everything they can to bring shoppers to their store, from Black Friday and Cyber Monday sales

02 Dec 2014

New Hack Could Be Affecting Your Web Server

If you own or manage a web server, you need to know about a recent vulnerability identified by the Dutch security firm, Fox-IT.  This vulnerability involves embedding malicious software into add-ons for popular content management systems such as WordPress, Joomla, and Drupal. This exploit is referred to as a backdoor vulnerability, which is

22 Nov 2014

Cyber Threat Alert – “Masque Attack” Affects iOS Devices

One of the most recent vulnerabilities facing cyber systems today is called the Masque Attack.  This vulnerability, which affects Apple iOS systems, was identified by the United States Computer Emergency Response Team (CERT), which is part of the U.S. Department of Homeland Security.  CERT released a formal alert for the