Tag Archives: cybersecurity

#BE30DayChallenge

#BE30DayChallenge: Secure Your Digital Life

In this 30-day challenge, take some time to take a few steps to secure your digital life

So much of our life is spent online, yet so many of us are not…

By Samara Lynn

Posted: Tags: , , , , , ,
#BE30DayChallenge

#BE30DayChallenge: Week 1, Lock Down Your Social Media

Use this week to be proactive in making small, yet significant changes to protect your social media accounts

It’s becoming all too familiar: That frantic post from a Facebook friend that reads something…

By Samara Lynn

Posted: Tags: , , , , , , , ,
email

5 Ways to Not Get Your Email Hacked

Save yourself some of Mrs. Clinton's headaches. Here are fives ways you can avoid becoming the victim of an email hack.

Save yourself some of Mrs. Clinton’s headaches. Here are fives ways you can avoid becoming…

By Samara Lynn

Posted: Tags: , , , , , , , ,
DNC

Cybersecurity Pros Familiar With Suspected DNC Email Hackers

The hackers and the methods they may have used to obtain the DNC emails are well known by those in the cybersecurity industry

When Wikileaks released thousands of emails from the Democratic National Committee (DNC), democrats called on cybersecurity technology…

By Samara Lynn

Posted: Tags: , , , , , , , ,
malware

Malware Drops to New Lows, but Florida is the Most Infected

We're getting savvier combating malware and with cybersecurity, but don't get too complacent, security company warns

A new report reveals computer virus and malware infections dropped 47.3% in the first half…

By Samara Lynn

Posted: Tags: , , , ,
iStock_000035515952_Medium

5 Ways to Tell if That Financial App is Really Safe

April is Financial Literacy Month. In its honor, here are ways to ensure you choose safe apps for your mobile financial services

The financial world is at our fingertips

By Samara Lynn

Posted: Tags: , , , , , , , , , ,
(Image: istock by Getty Images)

3 Reasons Apple and the FBI Both Lose on iPhone Issue

The nasty public battle between Apple and the FBI has repercussions for both entities

The nasty public battle between Apple and FBI has repercussions for both entities.

By Samara Lynn

Posted: Tags: , , , , ,
macbookair1-copy

How to Keep Your Mac Safe from Malware

A nasty bit of malware is infecting Mac computers. Here's how to tell if yours is infected and how to remedy the matter.

A nasty bit of malware is infecting Mac computers. Here’s how to tell if yours…

By Samara Lynn

Posted: Tags: , , , , , ,
Doug Bryant Jr

[Part 2] A Black Cybersecurity Pro Weighs in on Apple Fight and Security

An African American cybersecurity pro weighs in on Apple and other tech security matters

An African American cybersecurity pro weighs in on Apple and other tech security matters.

By Samara Lynn

Posted: Tags: , , , , , ,
Doug Bryant Jr

[Part 1] A Black Cybersecurity Pro Weighs in on Apple Fight and Tech Security

Doug Bryant is a certified ethical hacker and cybersecurity pro

Doug Bryant, Jr. is one of the relatively few black cybersecurity professionals. In a two-part…

By Samara Lynn

Posted: Tags: , , , , , , , , ,
Nissan Leaf

Nissan Leaf Security Hole Exposes Hacking Vulnerabilities of Connected Cars

Security experts find troubling vulnerability in the Nissan Leaf electric car

Some seriously lax security found on a Nissan electric vehicle underscores need for stricter security…

By Samara Lynn

Posted: Tags: , , , , ,
BE_John-and-Janice-McAfee

John McAfee: FBI’s Order to Apple is “Misuse” of Law

Cybersecurity guru John McAfee says the government is citing an antiquated statute

John McAfee weighs in on the conflict between Apple and the Department of Justice.

By Samara Lynn

Posted: Tags: , , , , , , ,
New Google logo

Google Will Give You 2 GB of Storage for Security

Secure your Google account and get 2 GB of Google Drive storage for free

Google pushes security with free storage space giveaway.

By Samara Lynn

Posted: Tags: , , , , , ,
Hacked_cybersecurity

Computer Infections Spiked During the ‘Blizzard’ of ’16

Jonas also brought in a blizzard of computer malware

Cybersecurity company reports significant increase in computer malware during the blizzard.

By Samara Lynn

Posted: Tags: , , , , , ,
compuer security

The Worst Passwords of 2015

We are still creating very weak passwords and getting hacked

If you are using any of these passwords, change them!

By Samara Lynn

Posted: Tags: , , , , , , , ,
CongresswomanSheilaJacksonLee

Congresswoman Jackson Lee, ICMCP on Need for Diversity in Cybersecurity

People of color could fill the industry workforce shortage

The main crux of the meeting was that while cybersecurity is critical for national security…

By Samara Lynn

Posted: Tags: , , ,
(Image: Janice Dyson)

Janice McAfee Talks Love and Business

Wife of tech titan John McAfee discusses living and working with her husband

Even if you have never heard of John McAfee, you have likely heard of his…

By Samara Lynn

Posted: Tags: , , , ,
(Image: File)

Nation’s Cybersecurity Upgraded with New Practices and Standards

The Obama administration partnered with private and public entities to manage risk and subvert threats

Over the last 6 months the U.S. Government implemented a wide range of policies to…

By Marcia Wade Talbert

Posted: Tags: , , , ,
many small businesses vulnerable to cyberthreats

Federal Employees May Be At Risk For Identity Theft

Union says OPM hid the extent of damage from a massive computer hack

The Social Security numbers of every current, former and retired federal employee was allegedly hacked,…

By Marcia Wade Talbert

Posted: Tags: , , , , , , ,
(Image: Twitter)

100,000 Taxpayers’ Data Stolen in IRS Breach

Criminals accessed tax information through the Get Transcript service provided by the agency

Criminals accessed more than 100,000 taxpayers’ personal tax information and bilked the agency for millions…

By Joel Lyons

Posted: Tags: , , , , , , ,