PayPal’s giant contribution to CyberSecurity

PayPal’s giant contribution to CyberSecurity

Six years ago, in an effort to protect their customers, PayPal came up with a brilliant idea that turned out to be an effective solution against fraudulent email senders and domain spoofers. The company enlisted the help of industry behemoths like Google, Apple, eBay, Microsoft, Yahoo, and others, and together, they created an open Internet method called the Domain-based Message Authentication, Reporting & Conformance specification, also known as DMARC.

[divider_top]

Secure your Android smartphone with these apps

Secure your Android smartphone with these apps

While there’s been some debate as to the need for mobile antivirus apps, there’s no denying the fact that there are hundreds of malicious apps and software out there just waiting to latch themselves onto our Android device’s operating system. Because of the Android OS’ open source nature, it’s no surprise that the amount of malware targeting the platform has been steadily increasing over the past few years.

Though some may argue that Google is already doing a great job of protecting users at the device and cloud level, the risks are still difficult to ignore, especially with stories such as this out there.

If you’d like to avoid any potential security risks to your Android device, take a look at these great security apps:

[divider_top]

Should you be worried about the Superfish security issue?

Should you be worried about the Superfish security issue?

When Lenovo shipped some of their notebook products worldwide last year, some users discovered they came with a piece of pre-installed tracking software. The software, Superfish, was created by a company of the same name, which apparently paid Lenovo “very minor compensation” to be able to install the software on their computer models.

Why is this a big deal?
Superfish pushes ads on the laptop owner’s browser. While this is mildly annoying, that’s not the problem. The big issue in the words of one of the first users who discovered the adware:
“[Superfish] will hijack ALL your secure web connections (SSL/TLS) by using self-signed root certificate authority, making it look legitimate to the browser.”

[divider_top]

The gadgets that spy on your phone – and you

The gadgets that spy on your phone – and you

It’s no secret that many governments have been keeping tabs on their citizens through controversial surveillance methods. Different agencies shell out millions of dollars on complex machines developed by tech companies – and with customers this demanding and lots of money, it’s no wonder why this particular sector of the tech industry is booming.

Take Harris Corporation, for example. For the past couple of years, it has sold a wide range of clandestine mobile phone surveillance technologies to different government agencies (which, yes, includes the National Security Agency). According to ArsTechnica.com, the company has earned over $40 million since 2004, all thanks to spy technology sales.

Here are some of the surveillance gadgets that have been used in the country over the decade.

[divider_top]

The 411 on dealing with online identity theft

The 411 on dealing with online identity theft

What is online identity theft? It’s when someone collects your personal information to open your online accounts, using whatever they find there for their own personal gain (or amusement). An identity thief can be anyone – it could be someone from a different country or even someone close to you. Identity thieves have different motives as to why they attack, from wanting to steal your credit card information to the desire to ruin somebody’s reputation and everything beyond and in between.

[divider_top]

Prevent hackers from stealing your personal info through your smartphone

Prevent hackers from stealing your personal info through your smartphone

Since our smartphones are now an integral part of our social and professional lives, they have become a gold mine of personal information and a storage bank that contains important data about how we live our daily lives. It contains invaluable information about ourselves, from our schedules and credit card information, to our private conversations, the apps we use, our social media profiles, and e-mails. In short, the kind of information you don’t want anyone else to access, but is precisely what hackers are targeting.

[divider_top]