Yubikey by Yubiko was a hit at last week’s CES 2019. Fans of this multifactor authentication device were already singing its praises, but these praises multiplied when Yubiko announced it now is compatible with iPhones and will be available soon to all users. Yubiko is a relatively new company so many have not heard the incredible reputation it is developing in the world of data security so if you are one of these individuals, dial in now and continue reading! Large corporations like Google and Facebook, who have extreme needs to secure data are already on board with Yubiko and have seen great success with their security needs.
What exactly is the Internet of Things (IoT)? In the simplest of terms, it is the interconnection of devices which allows them to communicate and collect data fully. When we think of connecting devices, we typically think of our smartphones, computers, and TVs but the IoT goes way beyond this. The devices that are now being connected include such things as cars, jet engines, coffee makers, refrigerators, heart monitors and soon, potentially anything with an on/off switch could potentially be connected.. According to Gartner, it is expected that there will be 20.4 billion devices connected by 2020.
Unless you have been living off the grid for the past year, you have heard of the massive increase in cybercrimes. One of the easiest ways for a hacker to get into your computer is by guessing your password. Think your password is secure? Are you aware that it takes less than 2 seconds to crack a simple 7-character password? Or that it takes only 13-hours to crack a simple 10-character password. But it takes a seasoned hacker over 10-centuries to hack a 12-character password that includes a space. So how do you keep your data as save as possible by creating a solid password?
If you are paying attention to the news at all right now, you have noticed the increase in cyber-attacks around the globe. Cyber-crimes are a hot topic and for a good reason. The threat is terrifying but understanding what is indeed happening is a challenge. Within cyber-crime reporting, keywords are being thrown around, and to understand the dangers, you must first understand a few of the basics. One of the topics you may have heard is port scans. First off, what is a port and why is a port scan a threat?
Smart Homes. What are they and are they safe?
Smart Homes are defined as,
“a residence that has appliances, lighting, heating, air conditioning, TVs, computers, entertainment audio & video systems, security, and camera systems that are capable of communicating with one another and can be controlled remotely by a time schedule, from any room in the home, as well as remotely from any location in the world by phone or internet.”
What are they and how do they work?
Security is a top priority in business. Everywhere you turn someone’s data is being compromised. One of the highest recommended tips for security is to use a password manager, and luckily, it is one of the simplest methods as well. Although it is easy, many still hesitate as they do not fully understand what it is and where the passwords are being stored. Let’s take a high-level look at what password managers are and how they work.
Keylogging. Is it a new concept or just an updated version of Espionage?
Information and specifically confidential data have always had a price, and someone has always wanted to get a hold of it. Documented spies date back in history from the 1st century. Espionage continues to evolve, and we as users of technology must stay on top of how our data is being hacked. Keylogging is one of today’s modern cyber-crimes but has the same basis as ancient spies.