January 22, 2018

Facebook Password Stealing Apps Found on Android Play Store

Even after many efforts made by Google last year, malicious apps always somehow manage to make their ways into Google app store. Security researchers have now discovered a new piece of malware, dubbed GhostTeam, in at least 56 applications on Google Play Store that is designed to steal Facebook login credentials and aggressively display pop-up advertisements to users. Discovered independently by two cybersecurity firms, Trend Micro and Avast, the malicious apps disguise as various

How Do VPNs Work?

We talk about VPNs (virtual private networks) a lot and how important they are to information security. But we rarely discuss how they work or what they’re doing. So today, we’re going to dive in a little deeper and attempt to visualize the process to get a better understanding of why we all should use VPNs, especially on public networks. VPNs For Beginners VPNs are subscription-based services that encrypt your

5 Common Cybersecurity Mistakes to Avoid in 2018

2017 brought new challenges for personal security, and 2018 will likely do the same. While we have little control over major data breaches as individuals, we do have control over our own personal security processes. Here are five common cybersecurity mistakes to avoid in the coming year and beyond. Connecting Everything That Can Be Connected How important is it to you that your eating utensil measures how quickly you consume food?