In this day and age, digital cameras such as still image and video recording cameras, home surveillance devices, and baby monitors all come with WiFi capabilities. While there are benefits of WiFi-enabled cameras, unfortunately, there’s also the potential for security concerns. For example, just in November 2014, the BBC reported that a Russian website displayed live feeds from private webcams, baby monitors, and CCTV systems from more than 250 countries to prove how easy it can be for attackers to access these cameras.
Continue Reading… How Secure is Your WiFi-Enabled Camera?
Companies use online advertisements to grow their business. Unfortunately, so do cybercriminals. Learn how cybercriminals use online advertising to spread malware, and how you can better protect yourself against this growing threat!
Continue Reading… Anatomy of Malvertising Attacks: How Cybercriminals Use Online Ads to Spread Malware
Your home router provides wired and wireless Internet connections to devices within your home network. Such devices could include your computer, tablet, smartphone, and even printer. More importantly, your router helps shield your devices from attackers – that is if you’ve properly secured your home router.
While it’s imperative that you secure your router, what if that’s not enough? What if there was a vulnerability within the firmware of the router that could allow an attacker remote control over it?
Continue Reading… Attackers Exploit Misfortune Cookie Vulnerability to Hack Your Router
The New Year means a fresh start for many people. For some, their attempt at this new journey begins by creating a list of resolutions.
As time progresses, many people find that some items on their New Year’s resolution lists get pushed back or even ignored. While it might be acceptable to postpone certain items on your list, security is definitely something you cannot afford to put on the backburner. If you neglect your security, it could lead you down the path of a not-so happy year.
Continue Reading… 7 Ways to Stay Secure This New Year
Your phone rings. The caller ID says ‘Windows Support,’ so you answer.
“Hi,” the caller says, giving a name. “I’m calling from Windows support. We’ve been receiving some error messages from your computer.” The caller says he can fix those errors if you give him remote access to your computer. You’re worried, so you agree.
Continue Reading… Who is Really on the Other End of the Line? Beware of Fake Support Scams!