
Top 49 Security Blogs Heading into 2015
The Top 49 Security Blogs – not named SecureThoughts – to Read in 2015 As we move into 2015, cyber security will continue to be a pervasive and important topic. Threats from malicious attacks, along with website and application vulnerabilities, continue to put our privacy and personal information at risk. To

Protect Yourself from Identity Theft
Protect Yourself from Identity Theft Identity theft is a serious problem with significant consequences for victims. Based on public statistics available online, 15 million people in the U.S. are victims of identity theft each year, with financial losses totaling 50 billion dollars. If those statistics provided you a wake-up call,

3 Best VPNs for Android
Summary: Using the internet on an Android phone or tablet with the default settings leaves you very vulnerable online. It means hackers can gain access to your personal information and control your device. A Virtual Private Network, or VPN, will protect your Android device. A VPN encrypts your presence online so that

3 Best VPN’s for iPhone
Summary: The iPhone is one of the most popular smart phones available today. However, this popularity also brings unwanted attention from hackers and criminals. The best way to protect your iPhone is through the use of a Virtual Private Network (VPN). A VPN will encrypt your phone and provide you with

New Hack Could Be Affecting Your Web Server
If you own or manage a web server, you need to know about a recent vulnerability identified by the Dutch security firm, Fox-IT. This vulnerability involves embedding malicious software into add-ons for popular content management systems such as WordPress, Joomla, and Drupal. This exploit is referred to as a backdoor vulnerability, which is