Daily Archives: September 3, 2014

Fake Cell Phone Towers & CryptoPhone

Seventeen fake cellphone towers were discovered across the U.S. last week. They were discovered by using the CryptoPhone, an Android-based secure mobile phone with 360° mobile device security for secure messaging and voice over IP communication on any network. “What … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Fake Cell Phone Towers & CryptoPhone

868,000 Payment Cards, 330 Stores

Goodwill’s investigation revealed that malware had been installed on a third-party vendor system used by 10% of its franchised stores to process credit cards. Twenty of Goodwill’s 158 regional headquarters in the United States were impacted by the breach, because … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on 868,000 Payment Cards, 330 Stores

Nude Celebs (The Fappening) !!! and Password Recovery

Nude Jennifer Lawrence… Sorta. Apple says that the mass theft of nude celebrity photos (Dubbed, the Fappening) that were released over the weekend did not occur because of a breach in any Apple systems, including iCloud. Apple also says that … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Nude Celebs (The Fappening) !!! and Password Recovery

Should We Buy Credit Monitoring Services?

With the ton of breaches that have been happening, we use one of the credit monitoring services, after this year though and all the breaches going on, one of the first services that is offered to potential victims, is credit … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on Should We Buy Credit Monitoring Services?