Chances are that you or someone you know has had an account hacked. But do you know how the cyber attacker broke through? In order to truly understand how to protect yourself, you need to understand how personal security breaches occur.
In the movies, cyber attackers shuffle through papers and photos for clues, guessing passwords until they pick the right combination and are granted access.
That is not how it happens in real life.
Cyber attackers use tools to automate the process and then conduct mass attacks across the Internet. These tools use dictionaries, lists of common words or passwords, and then try each one in succession. The name of your dog and birthday don't come into play during an automated attack, and therefore don't matter.
Yet there are steps you can take to help keep your accounts from being breached. Security expert James Jardine of Secure Ideas shares simple ways to foil cyber attackers by creating stronger passwords.
AV-TEST recently announced the winners of the AV-TEST AWARDs for 2014. These awards were presented in five categories, including protection, performance, usability, Android security and best repair. ... More >>
Cybersecurity Ventures recently announced their first Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year. ... More >>
Security today is based on the premise that one can detect whether something is good or bad. This premise is fundamentally flawed as malware continues to evade even the latest security technologies. ... More >>