Hey everyone, Jess Signet from Tripelio here! Thanks to Secure Thoughts for sharing this article regarding my experiences balancing work and travel. As an expert site in internet security and VPN reviews, they’re my go-to for tips on protecting my work product and personal information when I’m on the road.
Phishing – where a cyber-criminal seeks to con an Internet user into willingly forking over log in credentials, perhaps to an email account, or a retail account, or maybe even a bank account – dates back to the earliest days of the Internet. Some say it started on AOL in
You heard it yet again when fast food chain Wendy’s admitted it had suffered a data breach that apparently involved leak of consumer credit card information: “if only EMV, aka chip cards, was widely implemented, then this problem would stop,” many people lamented. Just one problem: it is flatly untrue. Universal
The very first article I wrote for SecureThoughts was an article on Stingray devices. In case you weren’t around then, Stingray is a nasty little surveillance tool. Masquerading as a cellphone tower, your cellphone will connect to a Stingray device automatically. While it’s connected, the Stingray can track you as
Every article on passwords must start by discussing the same subject, so here it is: You’ve chosen a weak password, and deployed it unwisely. This article, however, doesn’t choose password formation as its primary focus. There has been a flurry of activity in the news lately about users who’ve been
The story hides in the back pages of the globe’s newspapers. But it must be read. On December 23, large parts of Ukraine – a bitter enemy of Vladimir Putin’s Russia – were plunged into darkness as the electrical grid was hit by a malware attack. Ukraine makes no bones