First Airborne WiFi Virus Demonstrated

Original Article: This new development is yet another example of the security vulnerabilities inherent in most wireless routers and why securing them with strong encryption and passwords is critical.  Essentially, a virus can now infect, reside in, and spread from a wireless router to other wireless routers within range.  This is of great concern […]

Continue Reading Comments { 0 }

Is Open Source Software Really a Viable Option for Small Businesses?

Original article: Short answer:  Yes, and it goes far beyond saving money.  Open source software also tends to be more secure and patches for any flaws are usually released much faster than with proprietary software. Proprietary software is a business model for making profit.  When you “buy” a copy of Microsoft Office, for example, […]

Continue Reading Comments { 0 }

Biggest Security Threat to Users? – Wireless Routers

Original Link: This is something that has been going on for years and is one of the first things I check when analyzing a network:  Router manufacturers routinely sacrifice security for usability, meaning that unsuspecting home users who buy a new wireless router for their home, plug it in and start using it “out […]

Continue Reading Comments { 0 }

Metadata Collection & Its Impact On Your Privacy

Original article here: But before you read the article, what is metadata?  Simply put, metadata is data about data, and it is everywhere.  Take a selfie with your cell phone?  That photo is loaded with metadata potentially containing information about the time, date and location the photo was taken, the weather conditions, the name […]

Continue Reading Comments { 0 }

UK Security Branch Ranks Ubuntu Linux 12.04 Most Secure Operating System For End Users

Link to article below.  Like the author states in the article, I’ve been preaching (mostly to deaf ears) about the security of Linux for over a decade now.  It’s nice to have something like this to show people to back up the claims: For people who have never before used an operating system other […]

Continue Reading Comments { 0 }

2014 – The Year of Reclaiming Privacy

Unless you live under a rock, you have at least heard of the recent scandals regarding corporations and government agencies monitoring and storing phone calls, texts, and other digital activity of pretty much anyone in the world who has a cell phone or an Internet connection.  The most notable of these, of course, is the […]

Continue Reading Comments { 1 }

Don’t Swallow The Microsoft Kool-Aid – Know Your Options

The article below from PCWorld highlights the pros and cons of switching from a Microsoft Windows operating system to the major alternatives, and the points made are fairly accurate. There is a huge learning curve in switching from Windows XP/Vista/7 to Windows 8, not to mention the requirement of new hardware.  As the article states, […]

Continue Reading Comments { 0 }