by Mike Foster | Mar 19, 2019 | Cybersecurity
Everyone is tired of getting those annoying phone calls. Sometimes the callers are people trying to steal your credit card numbers. Tools are available to help stop the problem. YouMail and RoboKiller are two of the apps that do the job. We do not get compensated for...
by Mike Foster | Mar 11, 2019 | Best Practices, Cyber Security, Cybersecurity, IT Best Practices, Protection Tools, RSA Security Conference, Technology Safety Tips
The RSA Security Conference is wrapping up today. I’ve been here all week, and almost all of the best security companies demonstrated their security protection tools. Guess what was missing? Mobile device protection. If more than 70% of all Internet traffic is...
by Mike Foster | Jan 25, 2019 | Cybersecurity, Hackers, Hacking Competition
Hackers will compete for prizes from Tesla. In addition to the first winner who gets the car, Tesla also pays… $250,000 if they can hack the autopilot$100,000 if they can hack the modem or tuner$100,000 if they can hack the key fob or phone-as-a-key Microsoft, VMWare,...
by Mike Foster | Jan 17, 2019 | Alerts, Best Practices, Cyber Security, Cyber Security Breach, Cybersecurity, IT Best Practices, Password Manager, Password Safety, Password Security, Security Breach, Technology Safety Tips
Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords that have shown up on the dark web over the past two or three years. Think of Collection...