A Healthy Level of Skepticism

Email phishing scams are on the rise in the first quarter of 2018. With the rise of cybercriminal attempts to hack systems or harvest data using phishing emails, we wanted to cover the most basic steps a company or individual should take to protect themselves against these sophisticated scams. According to Phishing.org, “Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.” The concept is very …

Encryption: What it is and Where it’s Going.

In order to demonstrate private and public key encryption, it is best to have a cast of characters. Meet Alice, Eve, and Bob.     Alice wants to send Bob some sensitive information. Eve has been trying to get this information from Alice. She has been watching her communications in anticipation. How can Alice send this information to Bob without Eve seeing the information? Let’s assume that Alice and Bob are not able to meet in-person, so physically handing off the information is not an option. Symmetrical Key Encryption If this were a physical box containing sensitive information, then Alice …

Online Privacy and Cookies

Have you ever been on Google looking for something and then it shows up in your Facebook feed? Have you noticed that advertisements on the internet seem more and more applicable to your wants and needs? Well, you can thank (or scorn) big data for that. The practice is commonly known as “targeted advertising” uses data to target the most receptive candidates. Advertisers know that someone browsing for socks might very well purchase socks from an online retailer that gets in front of them. This sort of data can come from a variety of sources. One of the most common …