They are Doing What Now?

  • Post category:Security

Technology is great, especially wireless technology. RFID, NFC, Bluetooth, Wi-Fi, etc, all allow the transmission of data without the need for cables. When at the register, ready to pay, I…

Continue Reading They are Doing What Now?

Improving WordPress Security

  • Post category:Security

Blogs, commonly WordPress sites, are targets for online hackers. Hackers target blogs for many reasons such as infecting visitors, collecting information (physical location, passwords, favorite places) for identity theft, or…

Continue Reading Improving WordPress Security

SQL Injection

  • Post category:Security

SQL (often pronounced as sequel) stands for Structured Query Language and is one of the most commonly known programming languages. It is used as an interface for exchanging information between…

Continue Reading SQL Injection

Can you remain anonymous online?

  • Post category:Security

Can you remain anonymous online? Limit your online footprint Remaining anonymous online isn’t just for people with things to hide. Normal citizens have become concerned with unwarranted intrusions into their private lives. Organizations…

Continue Reading Can you remain anonymous online?

Social Networking: Are you safe?

  • Post category:Security

Social Networking: Are you safe? This question is often overlooked and is one that social network users should be asking themselves more often. Social networks are here to stay, and…

Continue Reading Social Networking: Are you safe?