Privacy Protection: Technical Surveillance During Travel Privacy protection while traveling can be a challenge. Whether you are traveling for work or for pleasure, you face an elevated risk of technical surveillance in rentals. The unsettling reality is that someone who rented the space or vehicle before you may have it under technical surveillance. Or, you […]
Read More +Reasons You Need A Bug Sweep After A Breakup
Reasons You Need a Bug Sweep After A Breakup Breakups are challenging. Ending an intimate personal relationship can drain you emotionally, physically and financially. And, before cellphones, smart appliances, home Wi-Fi and other modern connected devices came along, separating lives after a breakup was a whole lot easier. Now, the connected relationship becomes a complicated […]
Read More +Christmas Tech Gift Security Basics
Christmas Tech Gift Security Basics Christmas is a great time to give tech gifts! And, it’s also a great time to receive tech gifts. Yippee! Who doesn’t love unwrapping a present and finding an awesome gift that will make your life easier or more enjoyable. But, have you considered the security basics that you […]
Read More +New IoT Devices Pose Spying Risk
New IoT Devices Pose Spying Risk New IoT devices are emerging daily. The growth rate is astonishing. According to Juniper Research, the number of IoT devices in 2021 will reach an eye-opening 46 billion. Wow! These new IoT devices often make our lives easier. IoT devices can enhance efficiency, convenience, productivity or the overall quality […]
Read More +TikTok App Security Concerns
TikTok. You’ve likely heard of, or used, this wildly popular app. If you are one of the few who doesn’t know what TikTok is, the app is social media sharing app used to create short dance, lip-sync, comedy and talent videos. It’s been downloaded over 2 billion times on the app store and Google play […]
Read More +SWEYNTOOTH Bluetooth Flaw Affects IoT Devices to Security Systems
SWEYNTOOTH Bluetooth Flaw Affects IoT Devices to Security Systems It’s difficult to imagine the modern workplace without wireless technology. It wasn’t that long ago when everything was connected with wires: phones, internet, headsets… Nowadays, that’s all handled by LTE, WiFi, and, of course, Bluetooth. Bluetooth technology has revolutionized the world of consumer electronics. It’s found […]
Read More +O.MG Cable : Heads Up About a Serious Privacy Threat
O.MG Cable Privacy Threat How do you charge your wireless devices? While wireless charging is gaining popularity as a way to charge up our phones, the vast majority of people still use cables. If you’re an iPhone or iPad user, then your cable of choice is likely the Lightning Connector. The Lightning Connector was Apple’s […]
Read More +Open Source Information Can be Used to Compromise Your Safety
How much information do you post about yourself online? If you work in the business world, you are likely pretty careful in terms of your personal information posts. You probably use two-factor authentication, have a difficult-to-guess password, and maybe even hire a company like ComSec to check if you have cyber eavesdropping devices or vulnerabilities […]
Read More +What Are Your Expectations of Privacy at Work?
In the security world, we’re always concerned about the concept of “Big Brother.” This is code for a group that has your “best interests at heart” and monitors you “for your own good.” Note the air quotes. The concept of Big Brother was introduced in George Orwell’s dystopian novel, 1984, where an oppressive government regime […]
Read More +