A degree in philosophy left Luka stranded and lost on the job market until an unpaid internship with a cybersecurity company opened his eyes to an exciting and scary new world. He has since held many jobs and filled various positions in publishing, but the problem of online privacy has stuck with him – both philosophically and practically. Luka has combined his prowess at making complicated topics accessible with his passion for data safety. The result is DataProt: a project that helps folks retain the basics of a fundamental human need – privacy.
Phishing email scam costs Texas school district $2.3 million  
An FBI investigation is underway after a Texas school district lost about $2.3 million in a phishing email scam. The Manor Independent School District is based outside of Austin and encompasses more than 9,000 students.  The attackers didn’t use state-of-the-art malware or complex hacking. Ins
St. Louis resident convicted for using stolen information to file tax returns
Babatunde Olusegun Taiwo, a St. Louis resident, will serve a four year prison sentence for filing fraudulent tax returns using citizens’ stolen personally identifiable information (PII). Taiwo and his co-conspirators filed more than 2,000 fraudulent tax returns, totaling over $12 million. The c
Multiple TikTok security flaws found & fixed
One of the world’s most popular smartphone apps, TikTok, had serious flaws that made users vulnerable to information exposure and partial account takeover.  Researchers at CheckPoint, a renowned cybersecurity company, identified the multiple vulnerabilities.  The SMS verification protocol
Firefox update fixes zero-day vulnerability
The latest update to Firefox (v72.0.1) patched up a ‘type confusion’ vulnerability in Mozilla’s beloved browser. The zero-day vulnerability impacted IonMonkey, which is a JavaScript JIT compiler for SpiderMonkey.   A ‘type confusion’ exploit manipulates the memory allocation of inp
Would you fall for this phishing scam? 61% of Americans would
A recent survey revealed that the majority of Americans are at risk of falling victim to phishing scams. Conducted by cybersecurity firm Avast, the survey showed respondents two screenshots of the Amazon.com login page. Although seemingly identical, one was a screen capture of the actual login pa
Infographic – Be safe: Use a VPN
Protect your internet privacy, find the Best VPN. Which sites you visit in the wee hours of the night should be your business and your business only. Not your Internet service provider’s, not the government’s, nor any other eavesdropping nosey parker’s. You don’t even have to have anyt
Data governance market to grow to $4.8 billion by 2024
The data governance market is projected to grow significantly in the coming five years. According to research from analysts at MarketsandMarkets, the sector’s market is poised to increase from $1.8 billion in 2019 to $4.8 billion by 2024. That’s a compound annual growth rate of 21.5%.   The
Creepy hacks target Ring security cameras
The world of IoT is teeming with nightmares as hackers gain remote access to family homes through security cameras.  Families from Mississippi, Georgia, Florida, and Texas have reported unauthorized logins and widespread misuse of their Ring security-camera systems. One chilling story comes f
Facebook & Apple under pressure over encryption plans 
Tech giants are coming under mounting pressure from US lawmakers to make private customer data accessible to law enforcement.  In a rare show of unity, both Republicans and Democrats grilled Apple and Facebook  executives during a US Senate Judiciary Committee hearing earlier this week. 
Infographic – What you need to know about TOR
The iceberg metaphor may be overused, but it’s the best one we’ve got. The internet we usually surf is just the tip, and vast amounts of data is being stored below the surface. The Deep web is 500 times larger than the regular old internet of Google and Facebook. It’s where all the protecte
10 of the biggest data breaches in history
Data breaches by the dozens happen every day. Cybercriminals are constantly coming up with new ways to access databases loaded with sensitive information they can sell on the dark web or use for future attacks. If the daily news has you wondering about the biggest data breaches of all time, we have
For hidden hackers: New Kali Linux theme looks like Windows
Most people who run Linux fit into one of two categories: sysadmins and hackers. While a sysadmin probably won’t be a hit at the party, he has no reason to hide in a public setting. Hackers, on the other hand, often need to be inconspicuous. Whether one is working out of cafes or libraries, run