Cyber Security, Identity Theft, TOOLS & TRENDS

Bluetooth Vulnerabilities and How to Protect Your Devices

On Tuesday, researchers uncovered major Bluetooth vulnerabilities that could threaten billions of devices  using the short-range wireless protocol. The vulnerabilities could affect a myriad of smart devices ranging from Android or Apple smartphones to printers, smart TVs and IoT devices. The IoT security firm, Armis has uncovered a bug deemed the “BlueBorne” attack. The attack

Read More...

Cyber Security, Identity Theft, TOOLS & TRENDS

Public WiFi Safety Tips

In this age of instant access, we’re all guilty of using a Public “Hotspot” for WiFi at one point or another. Unfortunately we as a trusting species, are under the impression that our photos, personal email accounts and our private discussions via chat rooms or instant messenger are private using a public WiFi Hotspot. But

Read More...

Cyber Security

Location Services

In this Internet age of immediate access, convenience is everything. Whether you are buying a last minute birthday gift online, finding an old friend, or just catching a ride home in a strangers sedan, we have grown dependent on one little tool that lives inside every smartphone; Location Services. However, the location services setting can

Read More...

Cyber Security, Identity Theft

WannaCry Ransomware Copycat Bug

The WannaCry Ransomware bug may have been remedied thanks to White Hats and developers, but it is still wreaking havoc. In the aftermath of this latest ransomware epidemic, copycats are popping up which mimic many attributes of the WannaCry attack. The most recent copycat example of the Android ransomware, has capitalized on Wannacry’s popularity in order

Read More...