When Bobcats Go Ballistic

Introduction

If you were hoping for a peaceful autumn devoid of cyberattacks, then sit down for some bad news: An Iranian hacker group is going after Microsoft Exchange Servers and an infamous vulnerability, ProxyLogon, to exploit target systems and steal extremely sensitive data.

Is your password strong and secure?

A password is more than just an assortment of characters you’re required to enter in order to access your accounts. It is the first line of defense against potential threats and attacks. A weak password makes it easier for hackers or cybercriminals to gain access to your personal information, such as financial details or sensitive data.

Application Whitelist Vs. Blacklist

Introduction

There are all kinds of applications that you can, and might already have, installed on whatever device you’re reading this on!

If it’s a laptop or desktop computer, you might have programs like Microsoft Office, Spotify, Slack, and even games like Minecraft or the Sims.

Incognito? Maybe Not

Introduction

Google is headed to court again, this time embroiled a class action lawsuit that alleges Google misled Chrome users into believing that their Incognito searches were safe from the company’s infamous web tracking software.

Geotagging: What Is It and What Are Its Security Risks?

Introduction

Have you ever gone to post on your favorite social media platform, only for it to suggest that you add where you are logging in from?

Whether you’re checking in to someplace on Facebook, or browsing posts made from a specific location on TikTok or Instagram, you’ve probably come across geotags before—maybe you’ve even used a few!

It may shock you to hear this, then: Geotagging can pose cybersecurity and privacy risks if not properly managed!

How Does Geotagging Risk Your Data Privacy?

Geotagging involves embedding geographical location information (such as latitude and longitude coordinates) into digital media files.