Security

Kids’ Cyber Safety: Guidelines for Parents

Kids’ Cyber Safety: Guidelines for Parents

Most parents are not very educated when it comes to new technologies, internet use or social networks, which can often be a problem when it comes to your children’s safety online. It’s understandable that you should trust your kids in most situations, but unconditional trust that they will always do the right thing without you guiding or monitoring them, can put your kids in danger in both real and online world.

SECURITY RELEASE: Drupal 6.x and 7.x

SECURITY RELEASE: Drupal 6.x and 7.x

Just before the Thanksgiving holiday, the following security update was released by Drupal. Below the issue description, site owners can review the solutions and contact me to schedule their site maintenance. It is recommended that this upgrade be scheduled within the next 7 - 14 days.

Issue Description

Multiple vulnerabilities were fixed in the supported Drupal core versions 6 and 7.

HootSuite Reports Account Hack Attempts, Takes Steps

HootSuite Reports Account Hack Attempts, Takes Steps

Yesterday afternoon, I noticed something odd. I use HootSuite not only for myself, but for many of my social media marketing clients, and am often logged into multiple HootSuite accounts using several different web browsers. When switching back and forth between accounts to post updates and monitor activity, I kept having to log back in. Not only that, I was being asked to complete a CAPTCHA form, and then verify my account using Twitter or a code sent via email.

Will Passthoughts Replace Passwords?

Will Passthoughts Replace Passwords?

Recent advances in electro-encephalography (EEG) have encouraged an unprecedented level of interest in brain wave research and application development. Now researchers at the UC Berkeley School of Information have developed a way to identify a person's identity by analyzing brainwaves using commercial EEG hardware.

My Server Blocked Google

My Server Blocked Google

On Monday, July 1, I wrote an article that received a significant amount of attention, "How Not to Use Google+." Thousands of people were interested in that article, and many of them chose to share it to their own Google+ profile using the Google+ +1 sharing buttons on the post.

Apple Makes iPhone with iOS7 the Most Secure Smartphone

Apple Makes iPhone with iOS7 the Most Secure Smartphone

Apple announced the much-anticipated iOS7 today during WWDC's keynote address, and it did not disappoint. Among the many improvements and new features, one area that Apple has come a long way in addressing is Security. From keeping our logins and accounts secure, to helping to stave off iPhone theft, security is clearly a priority for Apple.

BlackBerry beats Apple, Samsung in BYOD brawl

BlackBerry beats Apple, Samsung in BYOD brawl

A recent audit on technology has earmarked security howlers in three of the biggest names in tablet devices, which has raised a lot of concerns with regards to the security ramifications of allowing employees to bring their personal devices at work.

Why getting online at your local coffee shop may not be safe.

Why getting online at your local coffee shop may not be safe.

If you're like me, whenever you're at a coffee shop, or anyplace else that offers free WiFi, you probably take advantage of that and connect your phone. While the free WiFi isn't always faster than my 4G cell phone service, connecting to WiFi makes sure I don't impact my cell phone plan's data quota, and some apps and downloads will only work on WiFi. So what's the problem?

Privacy.

Evernote responds to hack attempt by resetting all user passwords

Evernote responds to hack attempt by resetting all user passwords

Evernote, the cloud-based note-sharing app and service, has announced in a blog post that they have observed and blocked suspicious activity on their network. As a result, all user passwords have been reset. According to the update:

How secure are your social media accounts?

How secure are your social media accounts?

Last week, Twitter acknowledged that their systems had been breached, and that at least 250,000 Twitter users may have had their account information shared with the hacker.