Skip to content

Search Results: yahoo hack

Government Spying Isn

US Government Data Breach

Five Million Sensitive Fingerprints Were Stolen. So What Happens Next? The news was bad enough to begin with—the Office of Personnel Management (OPM) announced in early 2015 that the personal information of many Americans had been stolen in a major attack by hackers. The OPM, an official government agency, has the role of “recruiting, retaining…

[Read More]

If You’ve Been Naughty on the Internet, Better Cross Your Fingers

An adult website just got hacked. Customers are nervous, regretful. There’s a good chance that some husbands and wives, boyfriends and girlfriends, soccer moms, up-and-coming young executives and politicians (and millions more) are holding their breath, hoping for the best, changing their ways and may even be headed to church soon. That’s because an adult-oriented…

[Read More]

You Can Stop Stupid with Ira Winkler

Information security is not just technical. There is a human aspect involved and fixing that is more than just identification and awareness. Our guest today is Ira Winkler. Ira is the president of Secure Mentem and the author of the book You Can Stop Stupid. He is referred to as the modern-day James Bond, given his skills…

[Read More]

Tracking Scammers with Wayne May

Many of us have seen James Veitch’s comedic YouTube videos of him interacting with email scammers.  Today’s guest shares how he helps real-world victims of those scams and he has participated in taking down criminal enterprises.  Wayne May is the owner of scamsurvivors.com. He began as a scam baiter in 2005 before concentrating and helping the…

[Read More]

Cyber Security Awareness with Jake Moore

Have you ever wondered what strange things a digital forensic investigator has to dig through? Listen to this episode to find out.  Our guest for this episode is Jake Moore. Jake Moore is a cybersecurity specialist for ESET, Europe’s number one internet security and anti-virus company. Jake previously worked in the police force for 14…

[Read More]
Password Strength and Change is a Key to Block Spies

You Need to Create Stronger Passwords…Now!

Yes, it’s a hassle to remember to create stronger passwords every time you open a new account…and that’s why many people don’t do it. They use simple (“abcd,” “1234”) stupid (“password”) the same password ever time. Anything but a strong password. And hackers just love us for it. Almost every medium- to large-size company has…

[Read More]
The ABCs of Encryption. How does it work? What does it do?

Encryption: What It Is and How It Works

One of the benefits of a virtual private network (VPN), experts will tell you, is that any messages or data transmitted through a VPN are encrypted, which makes it all secure and unreadable. On a larger scale, all bank and credit card websites use encryption for transmitting their customers’ data. But just what does encryption…

[Read More]

TCP/UDP Port Number List

IANA Port Number List The port numbers are divided into three ranges: the Well Known Ports, the Registered Ports, and the Dynamic and/or Private Ports. The Well Known Ports are those from 0 through 1023. DCCP Well Known ports SHOULD NOT be used without IANA registration. The registration procedure is defined in [RFC4340], Section 19.9.…

[Read More]