Brick City Blog

Cybersecurity and Countermeasures: Because I believe that this subject is so important I would like to see computer users develop a keener knowledge of it. You must better protect your self, your assets and your privacy, constantly to stay out of trouble. There is a real cyber war going on out there and you need to know about it and act accordingly.

Most people do not perceive their self as being at risk. When you consider a needle in a hay stack that might be true, but what happens when you toss a match in to a hay stack, every one gets burned.

When you consider todays modern Mobil technology, you literally have a spy in your pocket. Think about it! Why take the chance?

To Be Forewarned Is To Be Forearmed

World's Biggest Data Breaches & Hacks... Read More

Can A.I. Anticipate Cyber Crime

Cyber crime and security threats are on the rise. No industry is safe and the stakes are high.

It’s not just your PC that’s at risk

In most cases, however, law enforcement agencies are powerless in the face of ransom-ware, especially the variants that hide their command-and-control servers on the Tor anonymity network.

Pause before you click

One of the biggest threats out there is phishing scams. These are deceptive emails and text messages that trick you into clicking on a link to a malicious site or downloading malicious attachments.

Why they do it

The types of attacks vary widely complexity and severity, but hackers generally have one of three motives for compromising networks...

What to Do If Your Social Security Number Is Stolen

A Social Security number (SSN) is probably the single most important piece of government-issued identification an American citizen can have...

The Small Business Guide to Cyber Security

With massive data breaches making headlines on a regular bases, it's hard to ignore the facts...

It's like leaving your keys under your PC's doormat

The researchers from ISE (read: white hats aka the good hackers) said that the password managers they examined don't always encrypt and clear the password from a computer's memory while transitioning from an unlocked (password manager is running) to a locked (user is logged out) state....

They're only as strong as your computer's defenses

Is it time to panic? Not exactly. Here's an important thing to keep in mind regarding these flaws -- these are only exploitable if a hacker has already managed to install malware on your computer. Your computer's operating system has built-in defenses against these types of memory access attacks, anyway....

Why Phone Numbers Stink As Identity Proof

Phone numbers stink for security and authentication. They stink because most of us have so much invested in these digits that they’ve become de facto identities. At the same time, when you lose control over a phone number — maybe it’s hijacked by fraudsters, you got separated or divorced, or you were way late on your phone bill payments — whoever inherits that number can then be you in a lot of places online....