Image by Gerd Altmann from Pixabay Social Engineering, the act of manipulating someone into divulging information or taking specific action to benefit the bad actor.…
The Tech Library
Image by Gerd Altmann from Pixabay Note: This is merely a guide. Password history policies will vary between companies and websites. This guide is starting…
Image by Gino Crescoli from Pixabay What is password complexity? Note: This is merely a guide. Password policies will vary between companies and websites. This guide is merely…
Photo by CMDR Shane on Unsplash What is a passphrase and how do I create one? Note: This is merely a guide. Password/passphrase policies will vary between companies…
Photo by Arthur Osipyan on Unsplash Data integrity…here we go again. First Facebook and now Google has been storing passwords in plaintext. Google had a bug that basically…
Photo by Two Paddles Axe and Leatherwork on Unsplash The thievery of credit card data is nothing new. The average price value of stolen card data has ranged…
Photo by Brina Blum on Unsplash While USB thumb drives are a useful tool, it is important to be wary of their risks. A USB cannot only contain…
Photo by Tadas Sar on Unsplash Windows has a recent zero-day vulnerability. This exploit allows attackers to establish a backdoor and run code in kernel mode. This is…
Photo by Carlos Muza on Unsplash Financial and personal identifiable information (PII) in today’s market is a valuable commodity. It should be an ever-growing concern for the confidentiality…
Photo by Glen Carrie on Unsplash Facebook returning to the spotlight not long after storing passwords in plaintext. According to UpGuard & Cnet, more than 540 million personal…