CRIP.TO
Read the Latest News and stay updated regarding Cybersecurity,
Encryption, Privacy, Safe solution to communicate across Internet.

There are ways of becoming less visible on the internet. Using the Tor browser is one, but that comes with its risks, as our post discusses. VPN connections disguise your location, disrupting accurate tracking of your browsing habits. However, we leave tracks and histories in a growing number of places. If we want to protect our privacy and information, what other options are available?

Email phishing attacks remain a go-to tool for bad actors everywhere. Many reasons for this include responding to an email in a rush, not being suspicious enough, clicking through an email link rather than going directly to a known site, and more.

You knew this had to happen eventually. After all, even a lowly fish tank thermometer can be hacked to allow network access. There are numerous advantages to smart medical devices. They can send data to the physician on a patient’s health. The patients can monitor their stats on an app. Theoretically, firmware and software updates could be downloaded. Although in this last situation, I’d want “firm” control over how and when that took place!

Recently, Germany’s Bundesrat legislative body passed a bill on to the Parliament for action designed to make it easier for authorities to prosecute individuals and groups operating on the dark web for illegal purposes. On the surface that sounds like a great idea. Who doesn’t want the people who hack systems and steal personal data held accountable for their crimes?

Isn’t technology amazing? Look how many things have been developed since the first personal computers hit the scene. It is a wondrous time to be alive if you are a technology and gadget geek. Naturally, there are those out there who want to spoil it for everyone. Hackers and bad actors, you know who you are.

The latest example of this crowd corrupting our tech toys involves the hard disk drives (HDD) on our computers. This technology is so last century. But, even as solid-state drives (SSD) take over if you want a multi-terabyte drive that doesn’t cost as much as a Tesla, the venerable HDD can’t be beaten, at least not in terms of price and capacity.

Stop cell phone spam

Give credit where credit is due, the bad actors are nothing if not resourceful. Take for example the newest delight appearing on cell phones around the world, spam, phishing, and other nonsense designed to trap the unwary and create problems for those unlucky souls.

PCs can be readily protected with a wealth of software tools and safe practices by users. You are using a current anti-virus/malware/firewall app and following safe online and email practices, right? Good, that’s what we thought. If you’d like a little primer on malware and safe online practices, check out our earlier blog post.

Teach a person to fish, and they can feed themselves, teach a hacker to Phish, and they can trap the unwary. Okay, poor metaphor using the old text, but phishing remains one of the most dangerous forms of cyberattack and one of the most lucrative. Unfortunately, the bad actors never rest and have recently launched a sophisticated new attack that can snare even seasoned and prepared veterans.

Do You Have a Tip or a suggestion for an interesting topic? Tell Us About It.

About CRIP.TO

We envision a world where all digital communications are safe and private. We are dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

Stay Updated

Enter your e-mail and we will keep you updated with our latest news.

Am I a Robot?