You may have seen some headlines over the past three weeks regarding Ubiquiti routers. Talk of “botnets” and the Department of Justice dismantling Russian malware is pretty splashy. Reading only the headlines, however, won’t give you a sense of the scale of the...
Since Windows 8, Microsoft has been more and more insistent that you sign in to your Microsoft account. But what are the tradeoffs? If you’ve set up a new Windows computer in the last ten years or so, you’ve probably run into a step that asks you to sign in. Over the...
You may have heard of a recent ransomware attack that brought Fidelity National Financial to a total standstill late last year. While the specific details remain under investigation, security experts agree that outdated software, particularly end-of-life operating...
A recent data breach at Blue Shield of California has us revisiting the topic of personal data and security. It’s a reminder that a lot of our data is stored by other people and reminds us that sometimes there’s not a lot we can do to protect all of our data. While...
Mobile device security is often a kind of black box: problems with software come up and then the company that makes your operating system or manufactures your phone send updates to fix the problems (when they want to). While software security is super important, a...
Most scams are based off age-old methods of deception. Impersonation, fraud, and unauthorized access are all their own flavor of deception, but (strangely enough) one of the most classic forms of deception might also be the newest: clickbait. Today, we’ll tell you one...