Tumblr Vulnerability Concerns Valid Amidst Social Data Breaches

colorful data graphs analyzed with a pen for decision-making in a focused workspace. tumblr.

Earlier this month, short blogging and social media tool Tumblr announced the presence of a vulnerability that could have exposed certain protected information to hackers under specific circumstances. The news came at a bad time for social media platforms. Just a week prior, Facebook announced an industry-shaking data breach, around the same time that Google […]

Facebook Database Breach: Practical Information

vibrant social media icons on smartphone screen for digital connectivity and accessibility. database breach.

Facebook’s Database Breach On September 16, 2018, Facebook discovered unusual activity via their network analytics equipment — it appeared that computer hackers gained some type of access to a database of approximately 50 million users. In July of 2017, Facebook introduced a new feature called “view as“, which allowed owners of Facebook accounts to view their […]

File-less Ransomware Uses Windows Tools Against You

ransomware warning: files encrypted - global threat alert!

By now everyone knows about ransomware, the dastardly strand of malware that encrypts data (or the drives it’s stored on) and sends the user a message demanding payment in a certain amount of time before the data is deleted forever. To add a little more menace to an already stressful situation, the message includes a […]

Password Protection

deep dive: unix directory structure for efficient file management & navigation. password protection.

Basic Password Protection Password management is one of the most basic ways of securing your network and data. However, a surprising number of people do not practice password protection, leaving their computer systems vulnerable to hackers. Hackers are constantly searching for passwords with which to penetrate your computer network. Phishing attacks, for example, will urge […]

Beware of Unsolicited E-mail

modern workspace with laptop, notebook, pen, smartphone, and coffee cup for productivity and creativity. e-mail.

Unsolicited E-mail Most computer users receive unexpected, annoying Emails. It happens so frequently that most E-mail account providers integrate a way to automatically divert blacklisted senders into a special type of inbox called a spam box. “Spam” is another term used to refer to unsolicited, annoying types of E-mail — but beware, there’s more than meets the […]

Let's Start a Conversation

Watch the video below and find out why you should fill out this form and start a conversation today.

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.