Tag Archives: internet security

How Data Brokers Threaten Your Privacy and Resell Your Information

Data brokers are buying, sharing and selling your information online.  While you have probably never heard of these companies…. they know all sorts of information about you and have most likely added you into a category such as: Financially Challenged, … Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Privacy | Tagged , , , , , , , | Leave a comment

Credit Card Hacking: 10 Things You Should Know About Smart Cards

The United States likes to think of itself as a technology leader yet has not adopted smarts cards as a replacement for magnetic strip credit cards. Smart cards are easy to identify because of the small electronic chip found on … Continue reading

Posted in Cyber security, Ethical Hacking, IT and Computer Security | Tagged , , , , , , , , , , | Leave a comment

Increase your chances of earning that Big Customer’s business with an assessment from a cyber-security expert at Superior Solutions

It’s a dubious honor at times to be the owner of a SMB: the operational concerns remain top-of-the-mind 24/7. No surprise, then, that hackers continue to focus their cybercrime on the ‘low hanging’ fruit offered by the softly-defended likes of … Continue reading

Posted in Cyber security, Ethical Hacking | Tagged , , , , , | Comments Off on Increase your chances of earning that Big Customer’s business with an assessment from a cyber-security expert at Superior Solutions

Will 2013 Be Like 2012?

Here is a look back at some of the top predictions of the security issues for 2012 and what they may portend for the year to come. Continue reading

Posted in Cyber security, IT and Computer Security | Tagged , , , , , | Leave a comment

To Prevent Cyber Hacks Should the U.S. adopt a “No Made-in-China” Policy for Chinese Made Telecom Equipment

Earlier this year, Information Age reported that Cambridge University researchers discovered that a microprocessor used by the U.S. military (made in China) contains secret remote access capability (a “backdoor”) which means that it can be reprogrammed or shutdown without the … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, Smart Phone Hacking | Tagged , , , , , , , | Leave a comment

Is Your Child Safe at Home?

Just as the internet can open your child up to the wonders of education, interactivity, and socialization, it can also let in risks such as viruses and mal-ware on your computers to the dangers such as predators, bullying, and identity theft. Continue reading

Posted in IT and Computer Security, Uncategorized | Tagged , , , , , | Leave a comment

Tips to Protect Your Customer’s Payment Information

Did you know that your unexpired credit card is worth as little as $0.06 and as much as $1000 on the black market? Cyber security experts explain that the “street value” of a stolen credit card number can vary widely depending on the status of the account, credit limit available, expiration date, and whether there is a physical-issued card to be sold as well. Continue reading

Posted in IT and Computer Security, Training and Education, Uncategorized | Tagged , , , , , , , , , , | Leave a comment