Jason O'Hare

151 Added | 2 Magazines | 2 Followers | @JasonOHare1kp5 | Keep up with Jason O'Hare on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Jason O'Hare”

A Secret Service Agent's Guide to Protecting the C-Suite from Hackers

Follow these six steps to keep your company's secrets safe when executives are outside the office.<p>Opinions expressed by <i>Entrepreneur</i> contributors are their own.<p>Cybersecurity is on the minds of most businesses today, but there’s one area where companies often screw up: failing to protect their key …

Intellectual Property

This simple phishing attack can steal your browser autofill data

Some browsers will turn over a user's autofill information -- even when the website doesn't ask for it.<p>Your browser might be inadvertently exposing …

Personal Data

This Free Website Will Show Anyone Your Personal Information. Here's How to Remove It

If you love your privacy, this is your worst nightmare.<p>Think the internet can’t shock you anymore? Enter your name in this website.<p>FamilyTreeNow.com, …

Personal Information

It turns out that halfway clever phishing attacks really, really work

A new phishing attack hops from one Gmail account to the next by searching through compromised users' previous emails for messages with attachments, …

Cory Doctorow

5 Free 256-bit Encrypted Voice Calls Apps With End-to-End Encryption

For those in the dark, FinFisher, also known as FinSpy, is surveillance software widely used by many government all over the world for spying on …

Information Systems

Ten easy encryption tips for warding off hackers, the US government—and Russia

On a frigid Saturday, pink and yellow Post-It notes scrawled with concerns about cybersecurity covered a wall of Eyebeam, a nonprofit art and technology center in Brooklyn. “Identity theft + surveillance = paranoia, plz help,” read one note. “How much of a threat do alt-right hackers pose on social …

Privacy

Top 10 open source projects of 2016

We continue to be impressed with the wonderful open source projects that emerge, grow, change, and evolve every year. Picking 10 to include in our …

Project Management

The Single Best Way To Stay Motivated Every Single Day

What is the <i>single best way</i> to stay motivated and energized every single day? How do highly successful people maintain their motivation—and continue to chase their toughest goals—through an entire year?<p>A reader named John recently contacted me with a similar question. He wrote, “I’m currently …

Fitness

The Psychology of a Habit and How You Can Change Them

Humans have an inability to change; this is an argument that has been discussed for centuries and it is largely because of our tendency to be …

Six Steps To Turn 2017 Into A Year Of Ongoing Career Success

As you celebrate the Christmas season and New Year and reflect back on 2016, how can you turn 2017 into a year of ongoing career success? By creating a career strategic plan.<p>Someone once said, “Success is the intersection of preparation and opportunity.” Achieving success requires more than luck, …

Motivation

Free security tools to support cyber security efforts

There are more free information security tools out there than you can highlight with a fist full of whiteboard pointers. While many are trial …

Cybersecurity

A better way to manage your passwords, explained with a cartoon

Have you ignored advice on using password managers? This cartoon is for you.<p>After every big hack — like when Yahoo announced last year that 1 billion accounts were compromised — experts tell us to stop using the same password for every website. In fact, they tell us to stop memorizing our passwords …

Information Systems

Save 98% On The IT Security & Ethical Hacking Certification Training

We have an amazing deal on the IT Security & Ethical Hacking Certification Training in our deals sore today, you can save a massive 98% off the …

Ethical Hacking

Why Yahoo's Security Problems Are a Story of Too Little, Too Late

In the summer of 2013, Yahoo (yhoo) launched a project to better secure the passwords of its customers, abandoning the use of a discredited …

Cybersecurity

Top 10 security predictions for 2017

Ian Kilpatrick, chairman of security specialist Wick Hill Group and EVP cyber security for Nuvias Group, looks at the rapidly changing security …

Russia accused of waging secret warfare against Britain using cyber attacks, espionage and fake news

Whitehall officials have for the first time acknowledged that Russia is waging a "campaign" of propaganda and unconventional warfare against Britain.<p>According to senior figures in Government, Moscow is to blame for concerted attempts to undermine the UK through fake espionage, misinformation, cyber …

The New and Improved Privacy Badger 2.0 Is Here

EFF is excited to announce that today we are releasing Privacy Badger 2.0 for Chrome, Firefox, and Opera. Privacy Badger is a browser extension that …

Privacy

SWIFT Confirms New Cyber Thefts, Hacking Tactics

Cyber attacks on the global banking system have continued – and succeeded – since February’s heist of $81 million from the Bangladesh central bank, …

Anti-Virus Software

Battle of the Secure Smartphones

Dark web users just <i>love</i> having their smartphone communications spied on, right? (Detect any sarcasm there?)<p>While no internet-connected device is 100% …

After interviewing over 100 successful people, Tim Ferriss says a passage from a 1922 novel captures the approach every high performer takes

Since starting his podcast in 2014, bestselling author Tim Ferriss has interviewed well over 100 highly successful people, from Navy SEALs to billionaire entrepreneurs.<p>He uses his interviews to pick apart the, as he puts it, "tactics, routines, and habits," that have brought these subjects to the …

Self-improvement

How to record your iPhone/iPad screen WITHOUT a Mac or PC

You can record the action taking place on an iPhone (or iPad!) screen by attaching the phone to a Mac via a USB cable and using QuickTime Player, but …

Apps

Everything you need to know about backdoors

The vast world of cybersecurity features secret portals of access to the deep web and undocumented encryption backdoors that most people look past …

Privacy

Phishing websites spoof 26 banks in India trying to steal customer details

Pretending as secure payment gateways, these phishing sites first gather sensitive data and then a fake failed login message is displayed to the …

Feds Get Expanded Hacking Powers

Rule 41 goes into action today, despite congressional efforts to block the changes.<p>PCMag reviews products independently, but we may earn affiliate …

Surveillance

DHS Publishes Principles, Best Practices for Securing IoT

The Department of Homeland Security recently published (PDF) its <i>Strategic Principles for Securing the Internet of Things</i>. It comprises six …

This Web-based Tool Checks if Your Network Is Exposed to Mirai

<b>Users can now check whether their network is exposed to Mirai, one of the most prolific botnets to have targeted Internet of Things (IoT) devices</b> …

Hackers Accessed Personal Data for More Than 130,000 U.S. Navy Sailors

Hackers gained access to sensitive information, including Social Security numbers, for 134,386 current and former U.S. sailors, the U.S. Navy said on …

Personal Data

Businesses Still Neglecting Cybersecurity (Infographic)

Cybersecurity requires agile improvement and dedicated resources. Unfortunately, instead of businesses taking the recommended holistic approach, …

Advertising Industry