How to lockdown LinkedIn

How to lockdown LinkedIn

While LinkedIn allows collaboration, job searching, and meeting new people, it is important to understand it hoards valuable information. LinkedIn has a dark secret like any other social media outlet and that is data can be leaked by default. This social channel has information like where you work, what systems you use, and even who…

Read More Read More

Shares 6
How to protect your Privacy online

How to protect your Privacy online

Protecting privacy has become a very serious topic in today’s digital world. The days are gone when privacy was actually private. We use many different tools, social accounts, and devices to accomplish our everyday personal tasks. We never stop and think how companies, government bodies and even hackers use this collected private data. As you…

Read More Read More

Shares 5
How to protect your Email with Two-Factor authentication

How to protect your Email with Two-Factor authentication

Setup Email Accounts for Two-Factor Authentication Times are getting tough when it comes to authentication and your private information. Understanding how to protect yourself can be exhausting.  Not many people realize “Two-Factor authentication” can completely lock down your accounts so that only you have access because it utilizes your phone or token.  It also provides…

Read More Read More

Shares 10
How to protect your family using OpenDNS

How to protect your family using OpenDNS

OpenDNS Protection is a safer, faster, smarter way to resolve all your domain names while you surf the internet.  How it works is that you replace your current router DNS IP addresses with either OpenDNS Home or Family.  After this change, they will filter all your website queries, protect, and filter out malicious and harmful…

Read More Read More

Shares 3
How to protect yourself from website Fraud

How to protect yourself from website Fraud

Fraud Protection Using Trusteer IBM Trusteer is a piece of security software, which protects your personal websites communication from fraud.  IBM Trusteer installs as a browser extension and adds more security to your current security toolkit.  It provides client-based endpoint protection against financial malware and phishing attacks. How it works: Trusteer verifies you are indeed…

Read More Read More

Shares 2
How to protect Social Media accounts

How to protect Social Media accounts

We are afraid of being hacked and having our information stolen from us. Therefore, to combat this issue and make your life more secure certain social media companies have implemented two-factor Authentication. Two-factor authentication allows you to setup your phone to receive codes before you can log into your account. Two-factor authentication compliments your current…

Read More Read More

Shares 6
Footprinting and Reconnaissance

Footprinting and Reconnaissance

Footprinting and Reconnaissance Here I will list off great external resources to help with Footprinting and Reconnaissance.  Please use these tools to learn only. Netcraft CA App Synthetic Monitor Web Application Security Black Widow (data mining suite) Website crawler Internet Archive Website Watcher Trace and Email Analyzer Check Email PoliteMail Batch IP Converter Wired and…

Read More Read More

Shares 0
Protect yourself using NoScript from Automated Malware

Protect yourself using NoScript from Automated Malware

We all love surfing around the internet and finding random cool things. However, did you know that every click puts you at jeopardy? What if I told you Malware could infect your computer simply by visiting a website that is running malicious code. Each time you visit a page or click a link you inadvertently…

Read More Read More

Shares 6