<< First  < Prev   1   2   Next >  Last >> 
  • 12/06/2022 1:27 PM | Technical Framework (Administrator)

    Researchers have discovered new cybersecurity vulnerabilities easily exposed using a vehicle's identification number, usually found in the lower corner of the windshield. Among remotely accessible functions was the ability to remotely unlock, start, locate, flash, and honk several makes and models of vehicles without any authorization or authentication.


  • 11/27/2022 3:40 PM | Technical Framework (Administrator)

    Social Media Video site TikTok seems to stay in the privacy violation spotlight. Among past allegations are that TikTok is an "unacceptable risk" and has "failed to protect children's privacy," thrown at it by the FCC and the UK's Information Commissioner's Office. Now the EU is tagging in to deliver more, based on the assessment that TikTok is in egregious violation of GDPR rules.

    Read more

  • 11/17/2022 1:04 PM | Technical Framework (Administrator)

    Google has settled lawsuits from 40 U.S. states for violations of privacy. The settlement of $392 million is a tiny fraction of Google's total annual revenues of $282 billion reported in 2021. The plaintiffs claimed that Google's Location History settings were misleading. According to a 2018 report by the Associated Press, "Location History" on Android and iPhone devices is not the master control for location tracking... Read more at

  • 11/09/2022 1:02 PM | Technical Framework (Administrator)
    Apple is under fire for allegedly harvesting data from iPhones, resulting in a class action lawsuit being filed in California recently. The lawsuit is based on research showing how various iPhone apps send detailed analytics data to Apple, whether the "iPhone Analytics" privacy setting is turned on or off... Read more at
  • 11/01/2022 3:52 PM | Technical Framework (Administrator)
    Ken Paxton, Texas Attorney General, has filed a lawsuit against Google for allegedly gathering and utilizing millions of Texans' biometric data without their permission.
    Since 2015, according to the Texas Attorney General, Google has reportedly collected many biometric identifiers, including voiceprints and facial geometry data, using products and services such as Google Photos, Google Assistant, and Nest Hub Max.
    This is a breach of the Capture or Use of Biometric Identifier Act, which states that businesses are not allowed to capture a biometric identifier (such as a retinal or iris scan, fingerprint, voiceprint, or record of hand or face geometry) of an individual for a commercial purpose without the individual's knowledge and consent.
    Paxton has filed several lawsuits against Google for allegedly breaching the privacy of Texans who make use of the company's products and services.
    In January 2022, for example, the Texas Attorney General filed a lawsuit against Google for breaching the Texas Deceptive Trade Practices-Consumer Protection Act.
    After less than a week, Paxton filed a second lawsuit against Google. The corporation deceived Texan customers by continuing to monitor their location even after they believed this option had been deactivated.
    Paxton stated that Google's indiscriminate gathering of Texans' personal information, especially highly sensitive information such as biometric identifiers, would not be permitted. And that he would not stop fighting Big Tech to protect the Texans' right to privacy and safety.
    The Australian Competition and Consumer Commission (ACCC) penalized Google $60 million in August for deceiving Australian Android users about the collection and use of their location data for over two years, from January 2017 to December 2018.
    In January, the National Commission on Informatics and Liberty (CNIL) in France handed Google a fine of $170 million for violating the freedom of consent of internet users. The commission found that Google violated this freedom by making it hard for users to dismiss tracking cookies by hiding the option behind several clicks. This was considered an infringement of the users' right to privacy online.
    In the past, Google has been subjected to the following fines: $2.72 billion for exploiting its dominating market position to manipulate search result rankings; $1.7 billion for engaging in anti-competitive practices within the online advertising industry; €220 million for favoring its services to the detriment of competitors; and $11.3 million for aggressive data collection.
    Read more about the lawsuit against Google:
  • 11/01/2022 3:42 PM | Technical Framework (Administrator)

    First, let's clear up any confusion between an Internet modem and a home router.

    Your Internet modem is the device provided by your Internet provider and links your home to the Internet, much the same as a phone landline connects a phone to your phone company.

    In contrast, the purpose of your home router is to securely connect all your wired and wireless devices, such as computers, smartphones, and TVs, to your Internet modem. Common home router brands include Netgear, TP-Link, and Linksys.

    Your home router should be set up and maintained by a trained professional.

    Following are the most critical security practices for home router setup and the most common points of a cyberattack when not followed.

    (To read the rest of the article, download our free E-Book titled, Personal Digital Security at

  • 10/25/2022 3:51 PM | Technical Framework (Administrator)

    The norms we've come to trust are being used against us. Emails with invoices, fake erroneous bank charges, and false DHL delivery notices are now all too common and result in countless heists each year. Here is a short list of how to spot an online scam:

    • An urgent need for money (or  other action)
    • Charges for products you do not use or own
    • Requests to purchase gift cards by your boss
    • A request for personal information by a stranger
    • Expiring password

    Read more about the red flags of a scam here:

  • 10/25/2022 3:44 PM | Technical Framework (Administrator)

    Home networks are being used by a growing number of smart devices, including IP cameras, smart TVs, and storage devices.

    A lot of devices have security flaws that hackers may exploit to take control of them or the home network itself, which can result in privacy breaches or much worse.

    HouseCall for Home Networks checks all devices connected to your home network for possible threats and offers solutions for mitigating them.

    With just one tap, you can find out all the devices that are tied to your home network and see if they pose any security risks. HouseCall for Home Networks also gives you tips on how to protect your devices and stay safe online.

    Read more about this valuable tool:

  • 10/25/2022 3:41 PM | Technical Framework (Administrator)

    While firewall science is well beyond the scope of this book, it's worth knowing basically what they are and why they exist.

    There are generally two types of firewalls: hardware and software. Both work as a barrier against hacks.

    Hardware firewalls earn their name because they are part of a hardware appliance like your home router. Software firewalls come standard on PCs and Macs and are turned on by default. It's usually not necessary to change the default settings of your firewall(s), and doing so requires the services of a trained professional.

    Why do you need both? Your hardware firewall works much like a guard at the outer gate, blocking threats before they enter your home network. Your software firewall is...
    (To read the rest of the article, download our free E-Book titled, Personal Digital Security at

  • 10/18/2022 3:49 PM | Technical Framework (Administrator)
    A VPN or "Virtual Private Network" is a security service to protect communication between your device (smartphone, computer, etc.) and the Internet. VPNs consist of an app installed on your device, which can connect to one of many VPN servers. Once the connection is established, all Internet communication is encrypted for security and routed through the designated VPN server, thereby obscuring your actual location. In other words, if I'm at Denver International Airport and establish a VPN connection to a server in Salt Lake City, all the websites I visit will view my location as Salt Lake. Nifty, eh?

    VPNs are most useful in public settings such as airports and coffee shops where it's possible for a hacker to "eavesdrop" on your Internet communication.

    Here's an in-depth read on the topic of VPNs:
<< First  < Prev   1   2   Next >  Last >> 

Contact us

Before corporations can be secure, each individual must be secure. Contact us today for information on how you can secure your personal digital assets and your home office.

(970) 372-4940



155 E. Boardwalk #400
Fort Collins, CO 80525

Powered by Wild Apricot Membership Software