Binary Blogger

255 Flips | 3 Magazines | 17 Likes | 6 Following | 10 Followers | @binaryblogger | Keep up with Binary Blogger on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Binary Blogger”

Deleting Facebook Won’t Protect Your Information, But Doing This Will

This week, news broke that the data analytics company Cambridge Analytica (which worked with the Trump campaign) had illegally mined data from 50 million Facebook users to spread disinformation. As a result, many internet users are decrying the platform, and the hashtag #DeleteFacebook is trending …

How to stop websites from using your computer to mine Bitcoin (and more)

Mining cryptocurrencies is a great way to earn small amounts of residual income (that could possibly be worth much more in the future). This is becoming an alternative revenue source some websites (and people with more nefarious intentions) are banking on.<p>Salon.com, for example, is giving readers …

Group of senators calls on FCC to delay net neutrality vote

Twenty-eight senators are calling on the Federal Communications Commission (FCC) to delay its vote on repealing its net neutrality rules next week, …

Net Neutrality

Is your ISP throttling your internet speed? Here's how to find out

While the Title II classification of ISPs as common carriers was a victory for all, there is growing concern that ISPs could go on with business as usual with clever tricks designed to skirt the rules of the classification.<p>While knowingly stepping outside the boundaries of the Title II …

Net Neutrality

LinkedIn requests from strangers can land you in hot water | The Star

“They can really tailor the phishing email to the person’s profile, based on what they do for a living, what type of job they have, all of which …

What is two-factor authentication, and which 2FA apps are best?

The age of widespread fingerprint and face-scanning authentication is almost here. Yet even in the age of Apple’s Face ID and Windows 10’s Hello, passwords are still the main way we log in to our various accounts. That’s why two-factor authentication (2FA) is still important.What is two-factor …

Authentication

Database leaks 47GB of medical records including names and test results

An Amazon S3 repository left publicly accessible has leaked about 47GB of medical data, the sum total of which includes 315,363 PDF files. The …

Five simple ways to protect your business from hackers and cyberattacks

The government has released advice for small businesses, written by the National Cyber Security Centre<p>This year has seen businesses and organisations …

Pornhub exposes ‘millions’ to massive ad malware attack

Millions of people who visited Pornhub in the last year were targeted by a cyberattack that could install malware on their computers, according to a …

This new phishing attack could make you give away your Apple ID password | Trusted Reviews

<b>Most iOS users are so used to popups asking for their Apple ID password by now that they just fill it in without a second thought.</b><p>But one mobile app …

Almost 2/3rds of tech workers now use a VPN, leading supplier reports 300% growth

An international cybersecurity awareness survey found that 65% of U.S. tech sector workers now use a virtual private network (VPN) on either work devices, personal ones or both …<p><i>(want to try a VPN? Specials.9to5Toys.com has a wide selection starting from Free Trials to lifetime plans.)</i><p>While much of …

Privacy

What will the internet look like without net neutrality? Just ask this sponsored data app

At first glance, Freeway looks like a good app. Through partnerships with content providers and mobile networks, Freeway can let users on limited …

DJI Mavic Pro Platinum Drone From $1,099

This month drone maker DJI has unveiled their latest flying machine in the form of the compact and portable Mavic Pro Platinum Drone which provides a …

DJI Phantom 4 Pro Over Northern Minnesota

It was vacation time a short while back and like always I brought my drone. I own a DJI Phantom 4 Pro and since I bought it I looked forward to this …

Security In Five Podcast Weekly Roundup 8/18/17

The Security In Five podcast has reached 50 episodes. Wow. I never thought I’d get this far with it. Starting out as a faint idea is now a daily …

Solar Panels

Episode 58 – Include Security In Your Business Strategic Planning

Security teams are most often looked to after the fact. CISOs and security leaders need to be closer, if not involved, with the strategic planning …

Security In Five Podcast Weekly Review 8/25/17

Another week has passed which means five more episodes of Security In Five. When I first started this podcast and committed to doing daily episodes I …

Communicate

What A Scam Text Message Looks Like, Don’t Fall For It

I was going about my business today and I received a text message. Not uncommon, I get several each day. This text message however addressed by as a …

10 browser extensions to keep you safe on the web

​You can never be too careful<p>It seems every time you hit F5 there's a new story about a massive corporate hack, a new ransomware outbreak, or the …

Leak of >1,700 valid passwords could make the IoT mess much worse

List of unsecured devices lived in obscurity since June. Now, it's going mainstream.<p>Security researchers have unearthed a sprawling list of login …

Information Security

IDG Contributor Network: 5 ways you could avoid and prepare for cyberattacks in your organization

In an age when cyber criminals abound, it pays to prepare and be always on guard. It means being aware of strategies criminals often resort to and …

Password managers are an essential way to protect yourself from hackers -- here's how they work

Most people are bad at passwords. Real bad.<p><i>Imgur</i><p>Chances are, your password choices are awful.<p>There are two key problems with people's password …

Cybercriminals Are Targeting Small Businesses That Don't Take Cybersecurity Seriously

Small businesses are tempting targets for cybercriminals, mostly because they do little to protect themselves.<p>Opinions expressed by <i>Entrepreneur</i> contributors are their own.<p>Could your business recover from an abrupt loss of $256,000? Because that’s how much a single cybersecurity hack could cost a …

Cybersecurity

Build Your Own Raspberry Pi Power Smart Home Alarm System For Just $50

Raspberry Pi enthusiasts or anyone interested in creating their very own smart home alarm system for less than $50. You may be interested in a new …

Elon Musk Shows Off Space X Spacesuit On Instagram

Space X and Tesla CEO Elon Musk has posted a picture of the Space X spacesuit on Instagram. He also revealed that the suit has been tested and works …

Cyber-security is an investment, not a burden

CEOs across the UK are increasingly seeing cyber-security not as a burden, but rather an investment opportunity, a new study has claimed.<p>The KPMG CEO …

Microsoft Sounds Alarm on Weaponized Virtual Machines on the Cloud

Attackers are targeting cloud accounts, hoping to weaponize virtual machines and gain access to valuable information.

Cybersecurity