average face of a hacker header 2
25 Jan 2015

Hackers Unmasked: If “Anonymous” Had A Face, This Would Be It.

From the massive release of private celebrity photos (which the internet dubbed “The Fappening”) to the North Korean Sony attacks, 2014 was a year of notable “hacking” activity. Events like these have created a call to action for increased security measures across the board, especially as data protection continues to

info@securethoughts.com' 0
02 Jan 2015

The NSA’s Conflicted Battle with Encryption

It’s no secret the intelligence agencies of the world spend a great amount of time trying to break  the many different codes and encryption types available today.  The NSA has their fair share of success stories in this area.  But, as the Edward Snowden leak showed, there are still some

25 Dec 2014

Top 49 Security Blogs Heading into 2015

The Top 49 Security Blogs – not named SecureThoughts – to Read in 2015 As we move into 2015, cyber security will continue to be a pervasive and important topic.  Threats from malicious attacks, along with website and application vulnerabilities, continue to put our privacy and personal information at risk.  To

ID Theft
24 Dec 2014

Protect Yourself from Identity Theft

Protect Yourself from Identity Theft Identity theft is a serious problem with significant consequences for victims. Based on public statistics available online, 15 million people in the U.S. are victims of identity theft each year, with financial losses totaling 50 billion dollars. If those statistics provided you a wake-up call,

online-shopping 1000x400
08 Dec 2014

How to protect your information when shopping online over the holidays

Yes, it’s that time of year again – the holidays.  At or near the top of most people’s to-do lists during the holidays is finding the perfect give for a loved one or friend.  Businesses do everything they can to bring shoppers to their store, from Black Friday and Cyber Monday sales

02 Dec 2014

New Hack Could Be Affecting Your Web Server

If you own or manage a web server, you need to know about a recent vulnerability identified by the Dutch security firm, Fox-IT.  This vulnerability involves embedding malicious software into add-ons for popular content management systems such as WordPress, Joomla, and Drupal. This exploit is referred to as a backdoor vulnerability, which is