Why spend the time, resources and even money it might cost to hack a computer to steal data and personal information when it’s just easier to get a victim to hand over the desired information willingly? That, according to Microsoft, is the crux of social engineering. This insidious form of cyber theft involves playing … Read moreWhat is Social Engineering?
From the moment you plug in a computer for the very first time to the second it’s properly decommissioned from use, that machine and the data it stores are vulnerable to attack. Viruses, hackers, spyware, social engineering ploys and other threats are just a few of the risks any ordinary computer owner faces. Understanding … Read moreHow Vulnerable Is Your Computer?
Go through a supermarket checkout line and swipe a savings card at the register and the powers that be behind that chain will be able to glean a lot of personal information about you and your purchasing habits. To some the simple act of allowing a store to track buying preferences is a great way … Read morePrivacy: At What Cost Do you Give Yours Away?