Computer Privacy Vulnerabilities

Hackable Keyboards and Mice

You can now add non-bluetooth wireless keyboards and mice to your list of “hackables”. Bastille, a cybersecurity research company, recently discovered two vulnerabilities affecting wireless, non-Bluetooth keyboards and mice. These vulnerabilities could allow hackers to eavesdrop on your keystrokes and expose your sensitive data including credit card and banking information, social security number and passwords.…

Case Study: Catfishing

Catfish /’kat, fiSH/ – to lure someone into a relationship by means of an online fictional persona. Words with new meanings are popping up all over the place. For example, the word catfish is also a verb used in connection with an online profile that stretches the truth or is fictitious. However for most people,…

Top 6 Vulnerabilities: An Open Door for Corporate Espionage

Is your company susceptible to being targeted for corporate espionage? Are you making it easy for someone to infiltrate your company’s proprietary information? The ruinous effects of corporate espionage have increased exponentially to the point that the FBI has invested in a campaign to raise awareness and alert business executives and owners to this risk.…