Password Security

What Is Password Entropy and How to Use It for Your Own Benefit screenshot

What Is Password Entropy and How to Use It for Your Own Benefit

Years ago, security experts realized that left to their own devices, users won't choose strong passwords. They saw that we actively need to encourage people to protect their accounts better. This, more or less, is why...

Read more
January 15, 2019
Let's Talk About the Length of Your Passwords screenshot

Let's Talk About the Length of Your Passwords

The password system is no doubt the leading form of authentication these days, but specialists suspect that it is doomed to die in the upcoming decades due to being not secure enough. According to Chad Holmes,...

Read more
January 11, 2019
Cyber Attackers Prove Themselves to Be Ruthless as They Attack Cancer Treatment Centers of America screenshot

Cyber Attackers Prove Themselves to Be Ruthless as They Attack Cancer Treatment Centers of America

You'd think that even cybercriminals have some sensibility and some sense of compassion, but the latest attack on the Cancer Treatment Centers of America has proven us all wrong. The Western Regional Medical Center in...

Read more
January 11, 2019
Windows 10 Security Questions Are Not so Secure Afterall screenshot

Windows 10 Security Questions Are Not so Secure Afterall

Whenever you set up a new account anywhere, you can create a safety net that can help you recover your password in case you forget it. Any system that requires you to use a password should come with such a safety...

Read more
January 10, 2019
Analysts Find Another Malicious App on Google Play Store That Spreads Malware screenshot

Analysts Find Another Malicious App on Google Play Store That Spreads Malware

Where do you get your apps from? Ideally, you get them from a reputable source, such as the Google Play Store. Unfortunately, the name of this online app market continues to flash in the headlines as new malicious and...

Read more
January 10, 2019
Yet Another App on the Chrome Web Store Is Found to Collect Sensitive Data screenshot

Yet Another App on the Chrome Web Store Is Found to Collect Sensitive Data

Cybersecurity specialists always recommend against downloading applications from unreliable or unknown sources, but what about legitimate platforms, such as Chrome Web Store? While it is advisable to obtain desired...

Read more
January 10, 2019
8 Biggest Password Breaches of 2018 screenshot

8 Biggest Password Breaches of 2018

Unfortunately, 2018 revealed that many companies are not prepared for cyber-attacks and cannot protect our personal information as a lot of massive data breaches that exposed data belonging to millions of users around...

Read more
January 9, 2019
NIST Guidelines for Password Security: If You Are Using a Password Manager, You Should Be in Good Shape screenshot

NIST Guidelines for Password Security: If You Are Using a Password Manager, You Should Be in Good Shape

The US National Institute of Standards and Technology (NIST) is a federal agency that is part of the US Department of Commerce which means that although it doesn't have any regulatory functions, it employs plenty of...

Read more
January 4, 2019
A Social Media Stunt Proves How Easy It Is to Hack Printers screenshot

A Social Media Stunt Proves How Easy It Is to Hack Printers

Many users who care about their privacy use complex passwords to protect their emails or social media accounts, but what about passcodes of devices that many of us use on a daily basis, such as printers? Cybersecurity...

Read more
December 19, 2018
Your Social Security Number Costs a Few Bucks and Can Be Sold to Anyone screenshot

Your Social Security Number Costs a Few Bucks and Can Be Sold to Anyone

If you believe no one is interested in your personal information, you need to think again. According to Experian, everything from your social security number to your medical records interests cyber hackers, and they...

Read more
December 19, 2018
I Received a Blackmail Email with My Password Included - What Do I Do Now? screenshot

I Received a Blackmail Email with My Password Included - What Do I Do Now?

Online sextortion scams are not exactly a recent phenomenon, and it's fair to say that no two are exactly the same. The schemes range from simple to extremely elaborate, and in some cases, the crooks tend to be...

Read more
December 11, 2018
Be Aware of Things that claim to Enhance the Cybersecurity of Your Business screenshot

Be Aware of Things that claim to Enhance the Cybersecurity of Your Business

When we talk about cybersecurity, we can divide it into two big sections: personal cybersecurity and business cybersecurity. Both spheres are highly interconnected, but it is a no-brainer to realize that cyber threats...

Read more
December 5, 2018
What Is Blockchain's Impact in Securing Our Data and Cyber Security screenshot

What Is Blockchain's Impact in Securing Our Data and Cyber Security

It is becoming more and more difficult to navigate the online world safely due to the constantly growing sophistication of hacking tools and cyber attacks in general. Judging from data breaches and attacks Internet...

Read more
December 5, 2018
What You Need to Know About the New Gmail Confidential Mode screenshot

What You Need to Know About the New Gmail Confidential Mode

If you have ever wondered how to make Gmail more secure, you might want to look into one of its newest features called Gmail Confidential Mode. This feature allows Gmail users to send messages without the fear of...

Read more
November 28, 2018
Secure Your Account: G Suite Admins Can Request Stronger Passwords screenshot

Secure Your Account: G Suite Admins Can Request Stronger Passwords

Years ago, technology companies realized that people aren't very good at managing their passwords correctly, and they've been trying to find a way of solving the problem ever since. Many of them seem to think that the...

Read more
November 27, 2018
Should You Worry About Malware While Using a Password Manager screenshot

Should You Worry About Malware While Using a Password Manager

Software is everywhere these days: in spaceships, toasters, refrigerators, and, undoubtedly, laptops, Desktop PCs, tablets, and smartphones. It makes our lives simpler by enabling us to work and study more...

Read more
November 16, 2018
Your Eight-Character Password is not as Strong as you Think screenshot

Your Eight-Character Password is not as Strong as you Think

While online security has been an issue worth discussing for a long while now, it is still most definitely a subject worth addressing. While the average internet user might not necessarily be extremely technically...

Read more
November 14, 2018
Millions of Phishing Websites Are Created Every Month: Uncover Their Masks screenshot

Millions of Phishing Websites Are Created Every Month: Uncover Their Masks

No one wants to be the silly fish that hooks up on random bait. The fishing analogy works just fine when we want to tell users what it feels like when they get tricked by phishing websites, email messages, and...

Read more
November 12, 2018