If you browse the Internet you should always use HTTPS when visiting websites, especially those that support it. It can be a manual effort and every website doesn't apply HTTPS equally all the time. That's where the browser plugin HTTPS Everywhere come...
Lake Street El
The tax man is coming. The date to file your United States taxes is looming closer and that means the phishing attacks are increasing. This episode goes into the different types of phishing scams, phone call scams and how to avoid them if you get them....
IoT, the Internet of Things, is the thorn in my security side. The unregulated, uncertified, unreasonable devices with minimal to no security flooding our homes and child's toy boxes. This episode talks about how easy it is to hack and find these thing...
Continuing with the mini series Top 10 Reasons To Conduct A Penetration Test we are at number 2. The second reason to test, because you need to find out the gaps. This episode breaks down things you can find only through pen tests you can't from other ...
With the inclusion of all these home automation, personal assistants into our lives we are adding more ears listening. Each one of the devices have microphones listening, some when you don't think they are, and your voices, conversations and lives are ...
If you have a Windows PC you probably have looked at your Task Manager and asked yourself, What Is That File? Is it dangerous? Why is it consuming so much memory? That is where ProcessLibrary comes in. This episode goes into what the ProcessLibrary.com...
If you are done with the privacy practices of Facebook you can break away from it. The hard part is the social aspect of family members and friends that may not. But you go back to the old methods of socializing by direct texting or actually picking up...
Facebook has no concern about your privacy, that's a proven fact. They want to gather as much information about your private life the better because that allows higher prices to advertisers to better 'customize' ads you see. If you aren't ready to dum...
Facebook gathers more data about you than you realize. However, you can download almost everything from Facebook to review it. This episode goes into how to do it and why you should. Take control of your data and privacy. Be aware, be safe. ---------...
After the week Facebook had I decided to commit a week's worth of episodes to talk about the various Facebook practices that are ultimately at your expense. The first episode talks about Facebook's business and at the core it's all about your private ...
This week's Tools, Tips and Tricks talks about MXToolbox.com. A collection of network, email and web testing/monitoring tools. If you run a website or manage an infrastructure there are tools in the MXToolbox that you will find useful. MXToolbox.com ...
The annual security report for the Department of Homeland Security was released and the results are shocking. The US Government agencies have the problems, same gaps and challenges as you do. The report is a great read and provides good insight to how ...
The General Data Protection Rule (GDPR) is the new privacy framework for the EU data starting in May, 2018. Many companies have been working toward compliance to these new laws but 50% won't make it. This episode talks about the five biggest challenges...
This is the first episode of a ten episode mini-series, Why You Should Be Pen-Testing your apps. The first episode talk about how pent-tests can help you meet security regulation requirements. Be aware, be safe. ------------------------------------ ...
Facebook released, then pulled back, another security product through their Onavo arm that siphoned data from your phone. This is the second app released in a month by Facebook that turned out to be nothing more than a surveillance tool. This episode g...
This week's tools, tips and ticks talk about OWASP Zap. The security testing proxy for your web application testing needs. Whether you are a developer or host an application you have a use for OWASP Zap. OWASP Zap - https://www.owasp.org/index.php/OWA...
Insider threats is a common phrase and most people associate it to a single type of person. The malicious individual intent to do harm. This is not the case, inside threats have many faces. This episode goes through the different type of insider threat...
When your personal devices breakdown you may take them to a local repair shop. Giving them your computer and most likely full admin access to repair it. This also opens the door that those technicians could look at, copy, manipulate your personal. Now,...