Tech.co logo

Airbnb Users Targeted in Latest Scam

May 17, 2019

5:11 am

Booking a weekend away? You might want to double check exactly who your booking is going through, especially if you're using Airbnb, which has found itself in the middle of a rather involved fraudulent scheme.

The scam is more organized than your common garden varietal online fraud, and actually has its own dedicated software subscription service so even lazy criminals can get in on the scamming.

The good news is that being aware of scams like this is half the battle, and we're going to give you some pointers on what to look for and what to avoid.

How Does the Airbnb Scam Work?

While scammers on Airbnb are not a new concept, this latest development, unearthed by Kaspersky, has upped the stakes from the traditional one-off fraudulent listing: This is mass deception on a huge and organized scale.

As ever with scams, it's a question of numbers. Try and defraud one person, and they probably won't bite. Try to defraud thousands, and if just one goes for it, well, there's your money. It's this scattergun approach that has been favored by email and telephone fraudsters for years. Now it appears it's the turn of the hospitality industry.

The bluff requires the fraudster to make and manage multiple entries on the Airbnb website at once, directing interested users to its own fake site, where the money is taken and contact stops dead. Managing all these listing is a lot of work, but luckily, this process has been streamlined by a dedicated subscription service for scammers. Yep, you read that right.

How the Fraudsters are Getting Organized

If you're looking to get into the online property scamming game, the hot new tool in your arsenal should be Land Lordz. Nope, not the latest Soundcloud rapper, but instead a software package which can, for a price, create and manage online properties (that you don't own), and collect the cash for you.

With the basic package costing $500 a month, this subscription service might seem on the expensive side, but when you consider that it allows you to manage over 500 fake offers and interact with 100 ‘guests' at once, you could soon be making your money back.

What the package does is lists ‘your properties' on Airbnb for you, along with legitimate looking images and fake reviews. The ruse then begins when the potential customer contacts the property owner for more details. At this point, the software will instantly send a link with more information to a site designed to ape Airbnb, fooling the user into thinking it's the real deal. The user is prompted to log in with their Airbnb details, which are harvested by the scammers, and if they pay for the property, so is their cash. After that, the fraudsters will disappear without even as much as a thank you.

While it appears that this latest scam is only happening to Airbnb, there's no reason why the software couldn't easily be adapted for similar sites, and the suspicion is that we could see this more frequently in the future.

How Can I Protect Myself from this Scam?

The scam might seem high tech and difficult to avoid, but at its core it's no more sophisticated than your everyday phishing link that you might get over email – it's just that this one works a little bit harder to gain your trust upfront.

As ever, it's vigilance that will save your from losing your cash. A little bit of pessimism goes a long way online, and it's important to stay within the ecosystem of the supplier you're using, and not get siphoned off to another site. Always insist on using the messaging system on the site itself, rather than private email, and if you are sent any links, proceed with caution. Check that the URL lines up with what you expect it to be, and if you're not certain, don't click. Should you happen to click on a suspect site masquerading as the real deal, a password manager could save the day, as it won't auto-fill your usual details.

Similarly, only make payments through the site itself, and don't be suckered into promises of discounts or special offers if you pay through different means. Doing this means you not only lose all the payment protections guaranteed by the original site, but also that you could be inviting a scammer to empty your bank account.

Though this is one of the more sophisticated scams out there, your money and your vacation will be safe if you stay skeptical and stay aware. As we've mentioned, knowing this scam exists is half the battle. Share the lowdown with your friends and family if you think they could benefit, or read more about known scams, privacy and security below.

1Password Launches Advanced Protection for Business Security

1Password has announced a suite of new features for its business password manager, introducing Advanced Protection. The new security measures ensure protection for both company and employee, including a master password policy, two-factor authentication and firewall reporting

LastPass Bug Almost Left Usernames and Passwords Exposed

Last week, security researchers from Google uncovered a bug that would have made LastPass vulnerable by directing users to a website loaded with just a few lines of javascript code. The bug has since been fixed by LastPass, and no users are known to have been affected.

NordVPN Teams Business-Focused VPN Announced

NordVPN, one of the most popular VPN services available, has announced NordVPN Teams, a VPN solution aimed at businesses, with a focus on features such as control panels, dedicated company servers, location defaults and 24/7 support.

Malware Found in Digital Textbooks and Essays for College

Security software company Kaspersky has discovered that thousands of students are unwittingly downloading malware when accessing essays and textbooks online. In the worst cases, the malicious software can take over an entire college network, posing a threat to all students.

Huawei Announces Mate 30 Phone Series – Google Apps Unconfirmed

Huawei has announced the reveal date for its upcoming Mate 30 series but no one is sure whether the new flagship phone will be available with Google's apps, or even if it will use the Android operating system. It's set to be one of the most intriguing recent phone launches.

Viral Chinese Deepfake App Zao Sparks Privacy Concerns

The just-launched app Zao lets users slap their own faces onto movie clips, letting them cosplay as Leonard DiCaprio or Wolverine within seconds. It's only available in China, where it's a massive viral hit. Zao's success has spurred plenty of concerns about privacy violations.

A Malware-Ridden Google Play App Had Over 100 Million Downloads

A malicious app has been downloaded more than 100 million times directly from the Google Play app store. The app, called CamScanner, allowed mobile devices to create PDFs. Here's how that app slipped through, and what it means for the cyber-safety of app downloaders everywhere.

Illegal Bitcoin Farms in Iran Cause Energy Spike

Iran's government-subsidized electricity saw a 7% spike in consumption in June, destabilizing the country's power grid. The culprit, according to Iranian authorities? 1,000 illegal bitcoin mining machines.

Apple's Newest iOS Update Has a Big Security Flaw

The newest iOS update, iOS 12.4, has accidentally unpatched an old security flaw that it had previously addressed, researchers have found. If your iPhone is running iOS 12.4 — and since it auto-updates, you likely are — you're theoretically at risk if you download a rogue …

Surprise! Posting a Block of Text Won't Protect You on Social Media

A 2012 internet hoax is making the rounds again, tricking naïve social media users into sharing a big block of legal text that in no way, shape, or form protects them, their pictures, or their data from being shared online.

Trump Plans to Tackle Social Media “Bias” with Censorship Paper

President Donald Trump hopes to pass an executive order that would see social media companies face closer scrutiny from the government, following his repeated allegations that the platforms show bias against conservative viewpoints.

US Tech Giants Are Reportedly Selling to Huawei Despite Ban

In May, the Trump administration issued a blanket ban on US companies supplying hardware or software to the Chinese tech giant Huawei. Now a new report claims that tech companies including Intel and Micron sold millions of dollars worth of products since the ban was announced.

Huawei Announces HarmonyOS – One OS to Rule Them All

At its annual developers conference, Huawei finally lifted the lid on its brand new operating system. Called HarmonyOS, the new operating system is set to work on a variety of devices — including smartphones. So, will HarmonyOS spell the end for Android?

Robocall Spammers Are Rampant, and the Best Solutions Are Drastic

Nearly half of all phone calls made in the US are from scammers, and the growing number of robocall nuisance or scam calls is creating a serious problem for consumers and regulators. We examine the current best practice advice and how legislation may change in future.

Kaspersky Reports Malware That Can Steal Your Browser's Autofill Data

There's a new type of malware on the internet: “Stealers.” They're aimed at swiping the autofill information stashed in your browser window ⁠— and one company found over 940,000 stealer attacks during the first half of 2019. Here's what to know and how to stay safe.

The UK's Internet ‘Porn Block' Delayed Indefinitely

The UK's controversial porn block has been delayed indefinitely after repeated delays which started in 2018. The policy, which was outlined in the Conservative's 2015 General Election Manifesto, has been troubled from the start with uncertainty over how the block would even work.

Russia Taunts US with Threat of Cyber War

The United States is allegedly hacking Russia's electric power grid. It's a digital shot across the bow designed to warn President Vladimir Putin that the US can use its cybertools more aggressively, according to current government officials.

Florida Town Pays $600,000 to Ransomware Hackers

Hacking has paid off for the criminals who held the computer systems of a small Florida town hostage. Riviera Beach, a Palm Beach suburb, has paid $600,000 in ransom to hackers who breached its system and encrypted the city's records.

Data Breach Exposes 2.8 Million People's Fingerprint and Facial Recognition Details

Suprema, a biometric security company has had its database breached, potentially leaking sensitive data about millions of people. The Biostar 2 database holds fingerprint and facial recognition data for big businesses around the world, as well as passwords, addresses and more.

Robocall Blocking Apps Found to Share Data

A new report took a dive into the most popular anti-robocall apps and found plenty of basic and obvious privacy violations. The most common: Anti-robocall apps often monetize their service by sending user data or device data to third-party companies for a profit.

5 Things We Learned from BBC Interview with Facebook's Nick Clegg

Today, Nick Clegg, Facebook's Vice-President of Global Affairs and Communications, sat down for an interview on BBC radio, and faced a grilling on his company's activities, past and present. Up for discussion were regulation, the Christchurch shooting, and Russian meddling.

Cyber Attacks Cost US Businesses $654 Billion in 2018

Online security hasn't been a big priority for US businesses, as a new report found that cyber attacks cost them upwards of $654 billion in 2018. Check out all the other details of the report there, including which industries are most targeted and how.

Russia Bans 9 VPNs, But Not Kaspersky

Russia’s regulations agency Roscomnadzor has told the country's top VPN providers to link their servers to the government's system. Only one VPN provider has officially complied: Kaspersky Secure Connection. All others will be blocked within a month. Here's why.

Firefox Could Get an Ultra-Secure ‘Tor Mode'

Firefox and the Tor Project are, apparently, working on developing a new private mode for Firefox with even more proection and security thanks to Tor's server layering tech. So, what will that mean in practice? And, does it make Firefox a more enticing Chrome alternative?

FaceApp's Russian Ties Spur Fears of Online Photo Privacy

FaceApp's viral images come with a policy offering little data privacy, a company based in Russia, and 80 million users' photos. Should we be worried? The app's backlash might not be entirely justified, but it definitely says a lot about how public opinion on photos has evolved.

Chrome Restricts Ad-Blockers: What This Means For You

Google Chrome may be one of the most popular browsers out there, but it has provoked plenty of ire recently in the way that it handles ad-blocking extensions. Critics have suggested that recent changes to Chrome will make dedicated ad blocking plugins ineffective.

Google Pays Contract Workers “A Few Cents” to Transcribe Your Conversations

Google has been paying contractors to listen and transcribe Google Home recordings of completely unaware users. One of the contractors decided to blow the whistle to a Dutch-language news site, revealing that some of the conversations are up to a minute long.

US Immigration Now Asks For Your Social Media Details

People wishing to travel to the US are now being asked to provide their social media details on visa applications, as well as their phone numbers from the past five years. These new visa rules are expected to impact 15 million people and give the US Government tonnes of data.

The Facial Recognition Fightback

In the space of two weeks, there have been three landmark incidents in the use of facial recognition in the US and the UK. So why is the public fighting back against facial recognition and why now?

Microsoft Drops Password Renewal Requests

If you're fed up with being pestered every month to change your password, just as you've memorized your last one, then we have good news for you. Microsoft are in your corner, and have claimed that it is unnecessary.

Major Dating App Data Leak Exposes 42 Million User Records

A large number of dating app users could be at risk for having their personal information stolen, as a security expert found an unprotected Chinese database filled with a lot of dating app user records.

Marriott and British Airways Hit With Millions in Data Breach Fines

The UK's Information Commissioner's Office (ICO) has levied a record-setting £183.39 million fine against British Airways for a 2018 data breach. It's just the latest development in worldwide data privacy regulations, and it's a sobering one for anyone working in cybersecurity.

US Declares National Emergency Over Huawei Security Concerns

Tensions between the US and Chinese-based tech giant Huawei aren't getting better any time soon, as the Trump administration has declared a national emergency over “threats to American technology.” We explain what you need to know about this latest move against the Chinese firm.

How to Watch the Women's World Cup Final with a VPN

This Sunday sees the final of the Women's World Cup, a soccer event that has grabbed our attention more than ever before, thanks to amazing performances on the pitch, as well as a little controversy off of it. Find out how you can watch it anywhere in the world, with a VPN

Millions Of Cisco Routers Around the World Have One Big Security Flaw

Security researchers have discovered two big new vulnerabilities in popular Cisco routers which are used by hundreds of millions of enterprise companies around the globe. Here's why that's a big deal.

What Needs to Change to Restore Trust in Tech

With constant news stories about tech companies breaking the law, or acting in morally dubious ways, Tech.co spoke to Ali Shah, the ICO’s new head of technology policy to find out how big tech companies can restore the trust of their users.

Don't Try To Download Avengers: Endgame – It's A Scam

Avengers: Endgame took in a billion dollars in the five days after it opened, destroying box office records. It's the biggest movie opening ever, but some would-be audiences are searching for a free download – which makes it the best bait for online scammers.

Facebook Dating to Expand with Secret Crush Feature – Should You Trust It?

Facebook's developers conference, F8, is currently underway, and one of the latest bits of info to drop is that the company intends to expand its dating app, Facebook Dating. Included is a new feature named Secret Crush, which lets users discretely connect with fancied friends.

Facebook Sets Aside $3bn for FTC Privacy Fine

Facebook has released its latest financial report, which shows a healthy $15bn profit, as well as the allocation of $3bn to deal with its upcoming fine from the FTC. Despite this, Facebook has hinted that it expects the fine could run up to as much as $5bn.

Largest Ever Email and Password Leak Just Got Worse

Already one of the largest data breaches ever, the list of 2.2 billion users' data is over three times larger than previously thought. Could you personally be affected? Odds are pretty high that you were. Here's more on what exactly happened and what you can do about it.

Watch Out for this Fake Airlines Scam Email

Web users are being warned to watch out for a new type of phishing email scam doing the rounds, this time, impersonating an airline flights purchase confirmation email. We explain how the airline scam email works in practice, plus what can potentially happen if you fall for it.

WhatsApp Cofounder Says We Should Delete Facebook

In 2014, WhatsApp cofounder Brian Acton sold the popular chat app to Facebook for $19 billion. This past week, he told attendees at a public appearance that they should delete Facebook.

ICYMI: Last Week on the Web | Feb 1 2019

It's only been the traditional seven days long, and yet this week has managed to pack a heck of a tech news in. We look at the stories that have caught our eye this week.

Verizon Study Identifies Mobile Security Risk to Businesses

A new study from mobile giant Verizon has shown that the phone in your pocket is magnet to hackers and scammers, showing an increase in the number of attacks on mobile devices. We explain why data hacks and security attacks are becoming riskier on mobile devices in the workplace

Hackers Could View Outlook.com Accounts for Months

Microsoft's Outlook.com email service was compromised earlier this year, the software company has recently revealed. As a result, hackers were able to access some Outlook users' private information for a months-long period.

Zucked: Waking Up to the Facebook Catastrophe – Review

Zucked is partly a story of Roger McNamee’s realization of Facebook’s ills, and partly a manifesto for a better internet. The book charts McNamee’s journey from Facebook optimist and investor, to concerned citizen and finally to privacy activist calling for Facebook's …

Facebook Messenger, WhatsApp and Instagram Integration: What You Need to Know

Facebook CEO Mark Zuckerberg has announced plans to combine functionality across the company's three massively popular messaging apps – Facebook Messenger, WhatsApp, and Instagram. Here's what you need to know about Facebook's biggest new development in years.

ExpressVPN Announces New Features for Apps

Today, ExpressVPN announced that it had updated its popular Android, iOS and Windows VPN apps with a selection of new features designed to make protecting your privacy and hiding your identity online even easier. These include split tunneling and easier location selection.

Opera Browser Update Includes Crypto Wallet, Web 3.0 Compatibility and Dark Mode

The Opera browser has unveiled loads of new features including a built-in cryptocurrency wallet, support for Web 3.0 applications, and a new dark mode. With the browser already packing a built-in VPN, it's a genuine Chrome competitor that's well worth a free tryout.

Apple Fixing Group FaceTime Bug That Lets Callers Snoop On You

Users of Apple FaceTime have uncovered a serious privacy issue this week, with the ability to listen in and even potentially watch another person using the Group FaceTime service, without their knowledge. Apple has removed the feature from its devices while it races to find a fix

New YouTube Scam Targets Victims with Identity Fraud

Influencers and content creators on YouTube are big business, commanding millions in branding deals and attracting legions of devoted fans. It was just a matter of time before a scammer had the idea to get in on the action. Recently, that has taken the form of a phishing scam.

LastPass Raises Prices on Premium Plan to $36

Industry-leading password manager LastPass has raised prices on its premium plan, taking it from $24 per year to $36 per year for new users, with existing users due a price rise upon renewal. The new price point puts LastPass more closely in line with rival services

German Anti-Monopoly Regulator Blocks Facebook from Combining App Data

In a major blow to Facebook's ambitions to more closely interknit its Facebook, WhatsApp and Instagram apps, a German regulator has ruled that the social media giant must seek users' explicit consent before combining their data across its various apps.

Study Reveals Security Risk of Remote Working

The benefits of remote work are great, but we can't ignore the changing security practices that come alongside the shift. More than one in three organizations have dealt with a security incident due to an unsecured remote worker, according to an OpenVPN study.

Mark Zuckerberg's Four Ways to Fix the Internet

Facebook CEO Mark Zuckerberg is making a new push for regulation across Europe and the US, and it's the biggest evolution in his public views on the matter we've seen yet. Zuckerberg explained it all in a Washington Post op-ed over the weekend. Here's the rundown on his thoughts.

EU Approves Internet Copyright Law – What It Means for Memes

The EU has passed the Copyright Directive, a contentious piece of legislation that updates and overhauls online copyright laws in Europe. What does that mean for parody, quotations, and memes? Take a look at what the new law means for your online experience.

Google Shares Online Tips and Tools for Internet Safety

This past Monday was Internet Safety Day, and to celebrate, Google is dedicating the week to producing a series of articles on its blog, aimed at protecting users with advice and tools. We check the advice Google gives for staying safe online and protecting your accounts

Google Announces AI Ethics Panel

Google has announced the formation of an AI ethics panel, which will tackle how the company should responsibly use and develop AI projects. Made up by a diverse group from academic, corporate and government backgrounds, the council will formulate Google's AI approach.

Russia Threatens to Block VPNs that Don't Support Kremlin Censorship

The Russian telecoms regulator has threatened to block access to VPNs if the companies behind them do not apply the country's censorship laws to users. The move has already led to VPN companies shutting down their servers in Russia, and leaving customers in the country stranded.

Russia Preps to Completely Block Foreign Internet

Russia is preparing to test whether it can completely cut itself off from the internet. The country is ready to take this extreme measure in the event of a cyber or real-world attack from a foreign power. But with Russia's reputation for censorship, is there more to the story?

The Impact of Running Your Business From Your Personal Phone Number

Running your business from your personal phone number has a lot of negative ramifications. Here's why you shouldn't give out your personal digits for business purposes, how you can keep your company secure, your personal life safe, and your business growing.

Ex-Huawei Employee's Spying has “No Relation” to Chinese Tech Giant

Last week, a Huawei employee was arrested in Poland on espionage charges. However, it apparently had no relation to his work for the company, despite widely expressed fears over its links to the Chinese government and military. So is Huawei as bad as it's made out to be?

This Company is Completely Rethinking Network Security

We speak to Kurt Glazemakers, a CTO at security company Cyxetra, about the way it is completely transforming network security to help protect companies and keep our data safe.

China's Social Credit Score Has Turned it into a Tech Dystopia

China's tech-powered social credit score has blocked millions of ordinary people from travelling on trains and planes for failing to pay small fines and walking a dog without a leash, and it's turning the country into a 1984-style dystopia. But could it happen in the west?

Children's Hospital DDoS Attacker Gets 10 Years in Prison

A Massachusetts man, associated with hacktivist group Anonymous, has been sentenced to ten years behind bars for starting a DDoS attack against Boston Children's Hospital, as well as a $443,000 fine. The attack crippled the hospital, rendering it ineffective for several days.

Only One-Third of Android Antivirus Apps Work Properly

A new report from security company AV-Comparatives has revealed that only 80 of the most popular Android antivirus apps give you effective protection and only 23 of those apps can guarantee a 100% threat-detection rate, highlighting the need for proper Android security.

Is Facebook Really Becoming a “Privacy-Focused” Social Network?

Facebook CEO Mark Zuckerberg has published a note outlining his vision for turning the social network into a “privacy-focused” platform. This is a complete reversal of its previous actions, so can we actually believe him? And, if it is true, what will the new Facebook look like?

HTC is Prepping for Web 3.0 – the Next Generation of the Internet

With crytocurrencies, new data and privacy laws, and impending regulation of internet giants, the internet is changing. We sat down with HTC's Phil Chen to learn more about the internet of tomorrow and whether the future is, indeed, bright.

Huawei Sues US Government Over Product Ban

Chinese telecommunications and smartphone tech giant Huawei is suing the US government over a ban on their technology that the company alleges singled them out for punishment without a trial. 

Netflix Faces Backlash After Agreeing to Saudi Arabian Censorship

The Communications and Information Technology Commission of Saudi Arabia insisted that Netflix removed the second episode of The Patriot Act, titled Saudi Arabia, which covers the murder of Washington Post journalist Jamal Khashoggi. Netflix complied, to global dismay.

Tech Companies and CEOs in Need of New Year's Resolutions

After a wild 2018 that saw some of the biggest names in tech mired in controversy, let’s hope tech companies and CEOs take note of a certain time-honored tradition and resolve to be better in 2019. We round up the companies and CEOs most in need of new year's resolutions.

The 10 Worst Online Scams of 2018

There have been a growing number of sophisticated online scams throughout 2018, and we have had our eyes on all of them. From phishing schemes to malicious links, you will be able to spot them from miles away once you take a look at our 2018 scams roundup.

Twitter Forced to Unmask UK User Following Court Order

Twitter has been compelled by a UK court to reveal the user behind an account parodying the British pub chain JD Wetherspoon. Does this represent a dangerous precedent on the social media site by removing the right to privacy? Or is it a simple case of defamation?

London Met Police Trial Opt-Out Facial Recognition

London's Metropolitan Police have been trialling facial recognition technology in some of the busiest areas of the city recently. We went down to have a look at the operation and ask whether this tech will keep us safe, or whether it's another invasion of our privacy.

New Facebook Data Breach Exposes User Photos

As we all hurtle towards Christmas Day, Facebook has delivered a festive surprise – a security breach that affects up to 6.8 millions users. The Facebook breach, which saw third-party apps given access to users’ photos without permission, is the latest in a long line of …

Top 100 Worst Passwords Revealed

A new study has revealed the world’s 100 worst passwords, and it’s an eye-opening read. If you’ve ever given into laziness and logged in with such classics as ‘123456’ or ‘password’, then we’ve got some bad news. Find out what made the list, and how to avoid bad …

Would You Let Your Employer Microchip You?

It has emerged that several UK-based companies are considering giving their employees surgically-implanted microchips. We look at companies that have done this in the past and whether this is the thin end of the wedge for intensive and intrusive employee scrutiny

How Hacks Can Target Banks and Nations

Hackers looking to get their hands on the big bucks will often go after banks and even nation states. We run through some of the biggest hacking incidents in history, including a cyber war in Estonia and the JPMorgan Chase hack from 2014

What Drives Hobbyist Hackers?

Not all hackers are bad. Some people just love breaking into networks so much they do it for fun, as a pastime. So what's driving these hackers to spend all their time hacking systems and networks if they're not even getting paid at the end of it?

What Is Ransomware And How Can You Avoid It?

Ransomware is a big deal in the world of scams. In fact, it even predates the internet itself. We decided to take a look back over the long and storied history of online extortion and show you how to avoid being scammed in the future.

A Brief History of State-Sponsored Hacking

With cyberwarfare always in the news, Tech.Co takes a look back over the history of cyberwarfare, including the first incident, the big Yahoo hack from 2013 and a joint US-Israeli project you've probably never heard of.

Did Chinese Spies Use Microchips to Hack Servers Around the World?

Everything you need to know about the Bloomberg Businessweek report which claims China infiltrated the US government and top companies including Amazon and Apple by placing tiny microchips on server motherboards manufactured in the country destined for the US market

The 5 Latest Scam Emails You Should Avoid

Scam emails have come a long way from requests for money from far-flung lonely hearts, or investment opportunities from dubious overseas princes. These days, email scammers are cannier than ever at imitating legitimate brands to trick victims. With 26 percent of U.S. adults saying they are...

Is Huawei a Genuine Security Threat?

Huawei phones are effectively banned from sale in the US, due to suspicion of Chinese state involvement in the running of the company, and ties to the Chinese military that go right back to Huawei’s inception. How real is the threat, and would you be safe buying a Huawei phone?

The Latest Online Scams to Avoid in June

Another month, another round of security threats and online scams. In the past week alone, it was reported that 500,000 routers worldwide are host to Russian-origin malware. The internet security news cycle means you're never far from breaking news of another data breach or …

How the GDPR Has Affected the Tech Community So Far

The General Data Protection Regulation (GDPR) is a directive from the European Union that aims to “protect all EU citizens from privacy and data breaches in an increasingly data-driven world.” By updating regulations that are old enough to drink, the EU has set the…

Amazon Selling Facial Recognition Tech to Law Enforcement

Amazon, one of the world's most powerful tech companies, has quietly been selling its facial recognition technology to U.S. law enforcement. Email and document evidence has found that in 2017, Amazon sold its “Rekognition” facial recognition and people-tracking software to …

Russian Hackers Infect 500k Routers with Malware

Hackers, believed to be supported by the Russian government, have infected 500,000 wireless routers worldwide with malware, security experts claim. The attack has been traced back to a group alleged to have interfered with the recent U.S. elections.   The malware, known as …

Yes, Your Boss Is Allowed to Read Your Private Emails

If you’re in the middle of writing a scathing email about your company to one of your work buddies, you might want to reconsider. Not only because there’s no place for negativity in the workplace, but also because there’s a good chance your boss…

Kaspersky, Huawei, and the Geopolitics of Tech Companies

The Russian cybersecurity software company Kaspersky Labs is opening a core data center in Switzerland in a move intended to restore customer trust. Why the image rehabilitation? In a word: Russia. Kaspersky's home country has turned it into a geopolitical persona non grata in…

The Online Scams of the Month: Minecraft, WhatsApp, and a Canadian Pharmacy

Online scams have become as much a part of the internet as cat videos and social media arguments. From ridiculous claims by “Nigerian princes” to extremely convincing fake login pages, cyber criminals have evolved their methods. Awareness of the latest scam threats …

Watch Out for This New PayPal Text Message Scam

A new type of PayPal text message scam is targeting smartphone users with a text message falsely warning that you've sent money to an unknown recipient. Follow the provided link to query this, and you could give your financial details to a scammer. PayPal...

Getting a Call From Your Own Number? It's a Phone Scam

Have you just received a phone call that appears to be from your own number? If so, it's likely a spoofed call that a scammer has set up in order to get you to answer their phone scam. I can personally attest to this...

Change Your Twitter Password Immediately – Yes, Yours Too

Happy World Password Day. In some spectacular timing, Twitter's 336 million users are being cautioned to change their Twitter passwords immediately, following an embarrassing revelation of an error in how password data is stored by the company. Yes, it's a pain, but this means…

Read Before You Agree: How to Understand Online Terms of Service

The security of the internet is finally getting its moment in the spotlight, with online giants being scrutinized as never before. And with data breaches, online hacks, and everyone's favorite social media giant run amok, it's about time. However, while internet users are …

The Secret to Security in the Age of Remote Working

In 2018, the future of the location-independent workforce is brighter than ever. Who wouldn't want the flexibility of taking the occasional (or regular) opportunity to break from the office and work where it suits you? Employees love it, and businesses increasingly see the …

Meltdown and Spectre Fixes May Not Cause Catastrophic Slowdown After All

Processors. They're not exciting, they're not sexy, but the moment they stop running properly, you'll sure know about it. That's why the reveal this January that every computer, tablet and smartphone on the planet (yes, yours too) was affected by the Meltdown and Spectre…

How to Make Sure Your Password Is Actually Protecting You

Your personal information is a valuable commodity on the digital market, and passwords remain the first line of defense against malware, phishing scams, and data hacks. Unfortunately, years of misconceptions about password strength have left users unsure how best to create a …

How Much Does Facebook Know About You? Three Tools to Find Out

For years, millions of us have shrugged off nagging privacy concerns about Facebook's use of our data. Now, with Facebook at the heart of a colossal data-mining process conducted by political-strategy company Cambridge Analytica, those days are abruptly behind us. Your likes, …

5 Apps Doing a Terrible Job of Protecting Your Privacy

Whether it's surfing the web or changing your clothes, everyone deserves a little privacy. Unfortunately, one of the biggest downfalls of our widely-connected, technology-obsessed society is that keeping your personal information to yourself is pretty much impossible. Whether …

Study: the Dark Web is the Safest Place to Buy Illegal Drugs

The internet is great. Not only has it allowed for an unprecedented level of connectivity around the world, it's also ushered in a new age of innovation. On what seems like a daily basis, internet-enabled technologies are changing daily life for everyone from toddlers…

Battling Cyber Hackers: The Next Generation of War Games

In 2017, society experienced more data security breaches than any year prior. “The final number of data breaches reported was 1,579, a 45 percent increase over 2016’s number of data breaches. Businesses continued to suffer the majority of breaches and more than eight times…

9 Apps and Websites to Help You Travel the World

47 percent of those between the ages of 18 and 34 would rather spend money on travelling than on buying a house. That's nearly twice the amount of those 45 and older — 26 percent — who said the same. That's quite the generational difference,…

The Modern Guide to Your Startup Workplace

Our vision of what an “office” looks like has changed over the decades, from the smoky, burbon-filled Mad Men offices of the 60s to the soul-sucking, flickering-lightbulb workplace of Office Space. But some classic elements of office work are still sticking around: …

5 Clever Phishing Scams Trying to Steal Your Personal Information

As the world gets more connected, the value of personal information has skyrocketed. Between companies utilizing big data to give their customers what they want and cyber criminals stealing it for their own sinister gains, personal information has become a valuable commodity for …

5 Ways to Protect Your Domain Name From Cyber Threats

Cyber security is no longer the job of just the IT department; it’s everyone’s job to be educated on preventive security measures. In a report by ICANN, an organization that defines protocol and policies for domain names and numbers functions on the Internet, they said:…

Girls in STEM and Cyber Security Among Top Startups at Eureka Park 2018

In a study by the US Department of Commerce, women in STEM jobs earn 33 percent more money than women in non-STEM positions. With computer science jobs predicted to increase by 22 percent by 2020 according to the U.S. Bureau of Labor Statistics (BLS),…

Why Retailers Love Gift Cards and How to Get the Most Out of Yours

Take care when recycling your wrapping paper this post-holiday season, because the last thing you want to do is accidentally throw out your favorite Christmas gift. Gift cards are a popular holiday item — total gift card purchases peaked at $130 billion in 2015,…

Eureka Park at CES 2018 Will Shine the Light on Emerging Startups

One of the must-see startup events at CES 2018, the largest consumer electronics show in the world, is Eureka Park. It is here over 800 of the world’s most promising new companies will showcase their breakthrough technology. At CES 2017, over 3,500 financial professionals …

This Holiday Season, Smart Toys Come With FBI Warnings

So you've finished all your shopping — with the aid of our excellent suite of holiday gift guides, of course — and you're finally settling down for a long winter's nap. But first, the FBI would like a word. Their public service announcement was…

5 Advantages of the Firewall as a Service Trends

Most companies need a firewall as a basic layer of protection in the digital age, but an emerging category of coverage—firewall-as-a-service (FWaaS)—is starting to change the game, introducing cloud-based architecture to the core firewall functionality. But why is FWaaS …

Congratulations America: Ajit Pai and the FCC Think You're Stupid

Today, the FCC will vote on a controversial decision to repeal net neutrality rules set in place by former president Barack Obama in 2015. The rules force internet service providers to treat all data the same, preventing them from throttling internet speeds in favor…

3 Cyber Security Predictions for 2018

With the new year right around the corner, there is plenty to look forward to in the world of tech. From fun gadgets to developing trends, technology has moved forward leaps and bounds since last year, and things are only getting more exciting. However,…

Study: Most of the Cyber Security Industry Is Facing a Serious Skills Shortage

While Hackers used to just be a 1995 movie featuring Angelina Jolie, they've actually become a pretty serious global problem in the business world. Granted, personal attacks will never go out of style, as the increased frequency of ransomware attacks has shown, but companies…

Konnected Security System Upgrades Your Old Wired Security System [Review]

From the beginning of my smart home automation journey in 2004, a personal goal of mine has always been to somehow integrate my aging hardwired alarm system into my smart home system. I'm guessing that Nate Clark of Konnected and I shared that vision,…

Experts Weigh in on the Future of Biometric Security in 2018

The buzziest news out of Apple's iPhone reveals this year was likely their Face ID, a biometric security system that opted to unlock phones by scanning user's faces rather than ask for a password or fingerprint. While a more secure method of verifying one's…

This ICO Wants to Use Blockchain to Verify People's Expertise

Can blockchain be leveraged to shed light on the truth? Plato, the ancient Greek philosopher, said that knowledge is what is true. But in modern times, truth is obfuscated by uninformed opinions, media bias and sales pitches disguised as advice. Knowledge.io will launch its…

Coros' New OMNI Cycling Helmet Has Bone Conduction and LEDs [Review]

For cyclists, there are few things you need along on your ride, and a comfortable and aerodynamic helmet is always on that list. It of course helps when it’s designed to protect your noggin, but being that is a given, there really isn’t a…

3 IoT Predictions for 2018

The internet of things and its interconnected web of usefulness is the sort of thing that, as annoying as it can sometimes be, quickly becomes integral to one's life. In other words, IoT isn't going away anytime soon, and as 2018 looms, that means…

Americans Love Net Neutrality, So Why Does the FCC Want to Get Rid of It?

A few years ago, the net neutrality debate was raging. People were calling their elected officials, taking to the streets, and even protesting outside the White House. Then in February 2015, Barack Obama signed into law some of the strictest net neutrality rules yet,…

The 5 Biggest Tech Scandals of 2017

2017's rapid-fire news cycle took plenty by surprise. The tech world, with its massive corporations, powerful leaders, and huge influence over the world's population, certainly didn't lack for it's share of newsworthy scandals. Now, thanks to a survey from Instamotor, we have a …

How Closed Circuit TV and Artificial Intelligence Are Making Moscow Safer

Between all the public, home and business security cameras and smartphones, let’s face it, we are most likely on camera at some point. Closed circuit television (CCTV) is in widespread use in public spaces, government buildings, and private establishments. The ease and lower …

Young People Believe Technology Can't Be Hacked. They're Wrong.

The world gets smarter every day. From homes and cars to teddy bears and baby monitors, technology integrated with the Internet of Things has become the undeniably path of progress for the foreseeable future. And while a connected world provides the convenience promised by…

TechCo Top Stories: SpaceX, Net Neutrality, and Holiday Gift Guides

Thanksgiving is in the rear view mirror, which means it's time to start planning out those Christmas lists and getting some shopping done. Lucky for you, TechCo has been putting out holiday gift guides like it's our freakin' job! Mostly, because it is. So…

Why Parental Control Software Is on the Rise

Raising online dangers connected with huge infusions into online porn industry and advertising, tech addiction pushed mobile developers to offer the mass usage solution, which guarantees the online safety for children. The most demanding niche happened to be parents who want to …

Watch This Cyber Security Company Hack Amazon Key With Ease

Earlier this month, Amazon announced a new idea that would stop those pesky sidewalk thieves from stealing your packages: Amazon Key. The innovative program would allow a delivery person to enter your home under video surveillance, drop off the package, and leave with the…

The 7 Steps to Shopping Safely Online

With the holiday season baring down on us, holiday shoppers everywhere are exercising their clicking fingers and combing through countless Amazon search results pages in their hunt for the perfect online shopping deals. But all that credit card information isn't necessarily …

Meet the 21 Semifinalists for the Women's Safety XPRIZE Competition

Rewarding innovation is the cornerstone of our economy. Fortunately XPRIZE, the non-profit organization launching public competitions intended to encourage technological development that could benefit humanity, has set up a system to do just that. Their competitions have spurred …

Cybersecurity Study Says Getting Hacked Is More Common Than Ever

Between global headlines and personal identity theft, hackers have become one of the biggest problems facing the world today. Sure, cybersecurity technology has been getting better, but it still can't account for the billions of people online, the millions of hackers trying to …

15 Cyber Crime Movies That Will Help You Hack the Mainframe

The entertainment industry has always been a step ahead of the tech world. No, it's not because movie directors and screenplay writers are smarter than tech founders and startup entrepreneurs. It's because film makers aren't burdened by reality. They can experiment with …

How to Securely Manage Passwords for Multiple Logins

The average person has 27 discreet online logins, and most of us reuse the same password over and over which can jeopardizing security. In order to keep your passwords secure, they should be 16 characters long and contain upper and lowercase letters, numbers, and symbols….

WyzeCam: $20 Security Cam Designed to Destroy All Competitors

Not a week goes by that a new startup or large corporation announces the next big thing in affordable home security. First we had the likes of Nest and Canary, then Blink, and many others followed beyond. Each device for the most part rivals…

How VPNs Can Help Startups Improve Cybersecurity

It cannot be denied that there is a fast growth of internet access all over the world. By checking current numbers showed by InternetLiveStats.com, you will spot the live users stat at nearly 3.7 million. While it's good to know that a lot of…

How to Secure Your Online Activity Through a VPN

Internet privacy is something that's on a lot of people's minds these days, as they are rightly concerned about how to protect themselves and their data while browsing the web. There are plenty of VPNs on the market, but not all security solutions are…

Is The New iPhone X Face ID an Invasion of Your Privacy?

Apple's annual September hype event always builds up to the reveal of a stunning new type of technology. This year's was an entire additional phone, the iPhone X, and its new facial recognition tech Face ID, which reads your face before unlocking your phone. With…

9 Solutions to Improve Your Company’s Data Security

It's not just the big companies that need to worry about security measures, small businesses, startups, even freelancers,  are becoming more concerned about protecting one's data. We asked 9 entrepreneurs what their favorite tool or solution they used to quickly improve their …

Anyone Can Find Your Location With Just $1,000 Worth of Mobile Ads

Anyone who's ever flipped through a copy of 1984 knows what a creepy dsytopian surveillance society looks like. What most people don't seem to have picked up on is that the process of a society turning into that type of dystopia is frog-boilingly slow. One…

Survey: People Are Even Stressed Out by the Photos on Their Phones

In 2017, people are more stressed than ever. Some of that's down to the political climate, but entire demographics are reporting more stress than before: Teenagers have more high anxiety, while startup founders regularly discuss their higher rates of stress and depression and …

Drones, Phones, And Automation: The Future Of Home Security

It flies around inside your house, ready to respond to any emergency, to ward off any intruder, and even to feed your pets when you’re away. No, it’s not your own overly-attentive superhero. It’s an Aevena Aire drone, a milestone of the future of…

How Technology Is Transforming the Gambling Industry

Since its inception, the gambling industry has found ways to take advantage of new developments in technology in order to ensure that it remains relevant and accessible. It's now easier to gamble than ever before with every smartphone serving as a virtual casino. Although…

How Lorex Technology Leverages Digital and E-Commerce to Sell Security Cameras

The security market is booming, and Lorex Technology is one of the companies leading the way. Growing criminal threats, coupled with advances in technology, are expected to propel the security solutions market to over $372.9 billion by 2022, says MarketsandMarkets’ Global …

7 Most Important Features of Cloud Storage for Small Businesses

With 87 percent of computing services projected to be handled by cloud-based services by 2019, startups and large businesses are scrambling to get their digital ducks in a row. Granted, the speed of change has notably skyrocketed in recent years, but that's no excuse…

A Cyberattack on Accounting Firm Deloitte Reveals Clients' Emails

Earlier this month we released a list rounding up the major internet security breaches of 2017, from WannaCry to HBO's 1.5 terabyte leak to the Petya ransomware attacks. And of course we've already had another cyberattack since then. Read all about it here, after taking a…

Watch This “Hacker” Pickpocket a Bitcoin Wallet in Less Than 3 Minutes

Identity theft always feels like someone else's problem until it happens to you. Offline backups, firewalls, and anti-virus software hardly feel necessary until you're the one on the phone with your bank trying to explain that it wasn't you that bought $150 worth gas,…

Study: Most IT Professionals Are Really Worried About the Cloud

Cybersecurity has become global news at this point in the game. With cyber attacks making headlines, hacks hitting corporations, and individuals being forced to hand over Bitcoin for their cherished personal photos and information, it's no wonder consumers have begun making …

How Crowdsourcing Can Help Fight Against Cyber Threats

Johann Wolfgang von Goethe coined the phrase, “precaution is better than cure,” and nowhere is that more true than in cybersecurity. Discovering weaknesses and loopholes before hackers can save you from devastating data breaches, data theft, loss of money and also …

7 Recent Hacks That Have Consumers Freaked Out

Every week, a new “largest hack ever” hits the headlines and strikes fear into everyday consumers.  From ransomware attacks to data breaches, these hacks have put more personal information at risk than the biggest blabber mouths of the business world put together. …

How to Protect and Monitor Your Identity After The Equifax Hack

The Equifax breach is one for the books and has compromised 143 million consumer's private and personal financial data. The unauthorized access occurred between mid-May and July 2017, and was discovered on July 29 – the company just announced it last week.  According to…

Hackers Can Now Silently Take Control of Your Voice Assistants

Cybersecurity has been a pressing issue for large corporations and small startups alike in recent years. From global ransomware attacks to corporate data breaches, hackers have become all too skilled at gaining control of huge chunks of information from banks, ecommerce …

5 Ways to Secure Your Company's Passwords

These days it seems that you can’t do anything online without having a password. With hackers targeting more small businesses, it's important for you to manage your passwords effectively because you’re just one hack away from having your business potentially ruined. One …

5 Tech Trends Startups Are Adopting In 2017

It's six months down the road and time to check in on startup that had high hopes when the year began. How many of the trends you've read about from earlier in the year have made their way into your operations? How many are…

Battlefield to Ballot Box, Cybersecurity is a War Game [VOTE]

Whether it be a small business or government entity, cyber attacks are coming at full throttle and hackers are finding ways to penetrate through systems. In a recent study, 94 percent of people think they can spot a phishing email, they couldn’t be more…

How This Company's ICO Quietly Netted $600K

Initial Coin Offerings for new cryptocurrencies are designed to maximize buzz and satisfy the urge to get in on the “next big thing.” And the media headlines are also fueling the recent ICO craze:“$150 Million raised in 52 seconds,” “Sold out in 7.5 Seconds,” …

This Top VPN Will Keep Your Online Data Safe for Life

We all store a lot of personal information on the web—credit cards, addresses, phone numbers—both consciously and unconsciously. With so much information saved in one central location, it’s important that we have a way to protect ourselves from the real possibility of …

How Shipping Costs Impact the Success of an Ecommerce Site

To compete in the ecommerce world,  there are a few things that you will need to do. Many businesses fail because they don’t take the challenges of running this kind of business seriously. Here are the key factors that could determine the success of…

TechCo Top Stories: Cheap Movie Tickets, Sell Your iPhone, Outdoor Gadgets

Have you been worried about how many TechCo top stories you've missed out on over the week? With a dozen stories published every day, it can be hard to keep up. Fortunately, we're as dedicated as you are to staying up to date on…

Study: Most Companies Have No Idea How Much a Cyber Attack Could Cost Them

Cybersecurity risks are everywhere nowadays. From phishing emails to ransomware attacks, there is no telling where your company's next security snafu might come from, particularly with fewer and fewer employees knowing how to spot a red flag. To make matters worse, IT …

What Does the Future Hold for the Internet of Things

The IoT continues to progress rapidly, and the results will make our futures brighter. It has grown out of just computers and expanded into the real world. Now, nearly everything is connected to the internet, from vacuum cleaners to coffee machines to toasters. Previous…

Experts: The Future of Online Trust Is Up in the Air

Trust in sources of authority is weakening across the online world: It's the natural result of a bot-ridden, highly politicized, fast-paced, and siloed world. All the recent hacks and leaked information have sped up the process. But is all that lack of online trust…

Meet the 4 Startups in UpRamp's Fiterator Accelerator Cohort

Keeping an eye on the Colorado startup ecosystem has become a necessity for anyone that considers themselves an entrepreneurial buff. Between legal cannabis and supportive entrepreneurs, it's only a matter of time before we start calling the Mile High City something like Silicon …

Why Millennials Will Move for the Perfect Job

The millennial is elusive. For one thing, they're just a collection of people who are roughly the same age, even though the category of “humans born in the 80s and 90s” covers a mass of different life experiences. On top of that, plenty of misguided…

DDoS Attacks Come in Small Packages

Lately the headlines have been all about the massive DDoS attacks. The record-breaking, Twitter-downing, internet-angering behemoths powered by unwieldy Internet of Things botnets. Given the kind of destruction these attacks are capable of, the media attention is not …

TechCo Top Stories: Side Projects, Merit Badges, and DNA Tests for Dogs

Do you know how many stories we publish on TechCo every week? Let me save you the time and tell you: it's a lot. And if you have any hope of keeping track of all the startup tips and tech news, you're going to…

Cyber Tips for a Plugged-In Summer Vacation

The summer months are often the most popular time for Americans to take vacations. However, as we shift our focus from every day routines to booking flights and scheduling time off, cybersecurity may quickly fall to the bottom of our list of concerns. According…

Top 100 Cybersecurity Startups in Q2 of 2017

With Black Hat in full swing and global cyber attacks making headlines more often than the Kardashians, the cybersecurity discussion is trending up in the business world and beyond. Large companies, small startups, and overly trusting individuals have been taken advantage of …

Your Social Media Is the Weakest Link for Cyber Criminals

According to a recent survey by Norton, 94 percent of users on the internet think they can spot phishing emails. Unfortunately, they couldn’t be more wrong. The fact is that hackers are becoming savvier when it comes to finding personal information and tricking not…

How to Train Employees to Protect Your Company Against Cyber Threats

In the wake of the largest ransomware attack in history, business leaders are scrambling to find employees who can help prevent future attacks. According to the FBI, ransomware attacks have been increasing and companies are willing to pay skilled security professionals a pretty …

4 Tech Roadblocks That Are Holding Marketers Back

Small and midsize businesses have a tech problem: Since they don't have the resources and capital available to larger companies, they can't easily plug up security holes, extrapolate from the data available to them, or navigate their communication systems as easily. Tech …

Most Internet Users Think They Can Spot Phishing Emails. Half of Them Are Wrong

If you aren't investing in cybersecurity measures for your business, you're in trouble. With cyber crime costs projected to exceed $2 trillion in 2019, securing your company's information should be a top priority for founders everywhere. And while you might think your employees …

The Healthcare Industry Is in for a Rude Cybersecurity Awakening

Cybersecurity has become a primary concern for small startups and large corporations alike. Whether it's a global ransomware attack or a minor DDoS hack, everyone's afraid of a hack, no matter how secure you think you are. And while ecommerce sites and social media…

Study: 50 Percent of IT Ex-Employee Accounts Remain Active for a Day

Everyone can picture that one “petty revenge” employee who should have been let go years earlier. But when they finally are given the boot, is their account properly locked afterwards. Half the time, a new study indicates, it is not. And according to 20…

How Major Tech Companies Are Standing Up for Net Neutrality

Simply put, net neutrality is good. It allows for free, un-throttled use of the internet across the board, while preventing internet service providers from creating paid fast lanes for specific content. It helps new companies compete with the big dogs and makes small startups…

Small Businesses Are Going to Need Bug Bounties to Combat Cyber Attacks

The likelihood of cyber attacks on small businesses is actually higher than the constant and varied cyber intrusions being reported worldwide. The New York Times reports that 62 percent of all such attacks are on SMBs, at a rate of about 4,000 per day….

TechCo’s Guide to Back to School Tech and Gadgets

The sun is shining, Independence Day has past (and still no alien invasion), and before you know it back to school time will be here. For some, this is nothing more than returning back to college, but for many this will be the entry…

How to Boost a Customer's Trust in Your Ecommerce Business

Trust can be a challenge for an online businesses. If shoppers don't feel secure providing their personal and financial information, how can business move their product out of the shopping cart? When customers put their faith in a new ecommerce site, it's reasonable for…

Study: Online Shoppers Don't Realize How Vulnerable They Are to Cyber Attacks

Online shopping is all about freedom. Unlike brick and mortar stores, ecommerce websites allow you to peruse dozens of stores, hundreds of sizes, thousands of brands, and millions of styles in the click of a button. However, this freedom apparently comes at a pretty…

So Is the New Ransomware Attack Petya or NotPetya?

Yesterday we reported on the latest ransomware attack, calling it “Petya.” But plenty of experts and news sources reported the attack under a name that literally could not be more opposite: “NotPetya.” So what's the distinction? Why is a cyberattack so …

What You Need to Know About the Petya Ransomware Attack

Cybersecurity concerns, true to most experts' warnings, have appeared to increase over the last few years. This week, another wave of attacks swept the globe, indicating that the problem is continuing to get worse. Dubbed Petya, the attacks affected 65 countries and were …

Here's What to Do About Cybersecurity's Gender Gap Problem

The security sector is a male-dominated industry: Right now, just 11 percent of the world's information security workforce are women, while at the same time, more than 200,000 U.S. security positions remain unfilled. Could boosting the profiles of current female security …

US High School Rocketry Team Wins Gold with a Rocket and an Egg

As a kid the opportunity to build a rocket was limited to paper towel rolls, tape, Mentos, Diet Coke and some imagination. Today high schoolers are learning the intricate details of building a rocket that can launch them into a carrier in STEM and…

Software M&A Has a Cybersecurity Problem That's Only Getting Worse

Yesterday, news broke of likely the biggest government data breach in the history of the universe. Today, we bring you the latest cybersecurity study, which reveals that although the majority of software mergers and acquisitions are plagued by security concerns, most …

Personal Data of 198M US Voters Has Leaked in Largest Ever Voting Breach

Political data breaches aren't just for the DNC anymore: A GOP data firm has accidentally leaked personal information on almost all of the 200 million registered voters it had access to. The database was left exposed to the internet on a publicly accessible Amazon server. …

4 Free Cybersecurity Tools for Startups

Investing in online security remains a key challenge for startup owners. After all, 71 percent of cyber attacks target small businesses, and those affected go out of business within six months of the attack. Unfortunately, the majority of available solutions cost a lot. On…

Startup Spotlight: World Travel, Compact Car Seats and Portable Vaults

Summer is almost here and we’re dreaming of sunshine and palm trees. We might not be there yet, but here at Tech.Co, we're adding some of this tech-savvy gear to our packing list! Each week, we scour the web for five of the latest…

4 Key Benefits of A Virtual Data Room for Your Startup

The world is swimming in data. In 2008, the digital universe alone created 487 exabytes or 487 billion gigabytes worth of data. In this Harvard Business Review article, John Sviokla wrote that the figure would grow five-fold in 2012. That number could have ballooned…

Survey: Security Breaches Affect Almost Half of U.S. Firms Using IoT

A new survey has found that nearly half of the U.S. firms using an Internet of Things (IoT) network have seen security breaches in the recent past. The resulting costs can be extreme, sucking up as much as 13 percent of smaller firms' annual revenues….

Voice Interface Is the Future. So Is the $10 Billion Voice Fraud Industry.

Every year, Mary Meeker presents the most influential report on internet trends from the previous year. Just out today, the information-packed 355-slide presentation can now be found online. One of the bigger trends it pinpoints? Thanks to mobile, voice interfaces are on the …

Google Just Uncovered a Massive Ad Fraud Network in Their App Store

Google just located and removed 41 Android apps — all from a single developer — that secretly included malware in each download. The apps used infected Android phones to auto-click on ads, and the number of downloads makes this possibly the largest mobile ad…

3 Cybersecurity Practices That Small Businesses Need to Consider Now

All businesses, regardless of size, are susceptible to a cyberattack. Anyone associated with a company, from executive to customer, can be a potential target. The hacking threat is particularly dangerous to small businesses who may not have the resources to protect against an …

Tech.Co Top Stories: Net Neutrality, Cybersecurity, and Hot Dogs

What a week for the tech world! From a worldwide ransomware attack to a mobile app that can tell you whether or not you're about to eat a hot dog, there has been a wide range of emotions flood through the innovative landscape. Fortunately,…

Here's How the WannaCry Ransomware Event Happened

We know cyberattacks have gotten worse recently, and the WannaCry Ransomware attack is the biggest one yet. Sadly, few people are equipped to deal with hacks and even phishing attempts: Just a few days earlier, we covered a report noting that 75 percent of CEOs rely…

Here's Why Startups Need to Care About the FCC's Net Neutrality Vote

In 2015, scores of protestors took to the streets in an effort to adamantly and decisively defend net neutrality. Millions of tech enthusiasts, startup founders, and regular ol' fans of the internet made their voice heard, which led to Obama's monumental move to protect…

Security Thought Leader on DocuSign Breach: “Yet Another Wakeup Call”

Digital signature service company DocuSign announced a security breach last Monday: A database of customer's emails had been stolen and used in a phishing campaign. But was the latest in a seemingly endless series of data breaches and hacking attempts actually that big a…

Study: Seriously, Nobody Cares About Cybersecurity Despite the Risks

With hackers holding Netflix series hostage, ransoming off personal information, and generally mucking up the digital world with DDoS attacks, cybersecurity has never been more important for budding entrepreneurs. Startups in particular are at risk, as their comparatively …

Everything You Need to Know About the WannaCry Ransomware Attack

Over the weekend, a cyber attack the likes of which the world has never seen held important data, pictures, and information hostage demanding Bitcoin ransom payments from worried users everywhere. While this kind of hack is alarming enough to make any tech enthusiast move…

5 iPhone Security Apps to Keep Your Phone Private

Nowadays, people are learning the importance of privacy and security and the role it plays in their lives. A breach of privacy and information can have unprecedented results, from losing important startup data to being the victim of identity theft. Those who are victimized by…

Security and Privacy Are Essential for the Growth of the Smart Home Industry

The smart homes industry is huge. In 2016, the global market value for smart homes surpassed the $50 billion mark, with a projected annual growth rate of 14.26 percent between 2017 and 2022. Analysts expect market value to hit $119 billion by 2022, making it…

Warren Buffett Shares ‘Number One Problem with Mankind'

Warren Buffett shared his thoughts at the Berkshire Hathaway's annual shareholders' meeting on Saturday when he shared that he sees cyber attacks as a bigger threat to humanity than nuclear weapons. The annual meeting was livestreamed by Yahoo for only the second time in …

5 Ways Startups Can Secure Their Business Conversations

Online security is becoming a serious issue in the business world, especially for startups. Many security measures that businesses put up to try and fend off cyber attacks often fail, leaving them open to variety of problems. These measures fail for a number of reasons,…

Study: Americans Don't Know How to Protect Their Online Data

Technology is a double edged sword. While it allows you to keep in contact with friends, check the weather in an instant, and watch more television series than should ever be allowed, it also opens up startups, corporations, and everyday citizens to cyber attacks…

Tech.Co Top Stories: Net Neutrality, Voiceovers, Waymo, and Bootstrapping

Being an entrepreneur guarantees you have a busy schedule. Between meeting with partners, talking to investors, and firing that one employee that keeps stealing everyone's food from the fridge. Fortunately, you don't have to miss out on any of Tech.Co's top stories because …

Ethical Hacking Emerges as Unique Career Path in Cybersecurity

Companies, now more than ever, are seeking qualified cybersecurity professionals to keep pace with the growing number of cyberattacks. Today, corporations and organizations across all sectors face millions of attacks each day, which cost more than $1 billion in losses annually. …

800 Startups, Entrepreneurs, and Innovators to FCC: Protect Net Neutrality

Net neutrality has been a hotly debated topic in the tech sector for a few years. While former president Obama did a great job of putting laws in place to protect it, innovators around the world are now worried about the future of net neutrality….

5 Things Your Startup Needs to Do After Launching a Website

You've launched your website and the startup now has its outfacing presence to the world. According to the annual BrightLocal Consumer Review Survey of 2016, it takes less than ten reviews before the consumers form an opinion regarding a particular brand. If you hope to…

6 New Cybersecurity Startup Cohorts from MACH37

The cybersecurity industry is rife with aspiring entrepreneurs and budding startups. But as with any industry that has a wealth of potential innovation, it can be difficult to succeed without some help along the way. That’s where MACH37 comes in. The MACH37 Accelerator …

Millennials' Phone Addictions Open Them Up to Fake App Security Risks

Picture a computer virus, and you probably come up with an uncloseable browser window that blasts a robotic voice's claim that your “com-pu-tor” is in danger unless you download a spam file. The target audience for this type of phishing scheme is undoubtedly an…

7 Ways a VPN Can Help Protect Your Identity

While many people are familiar with a VPN, many choose to not use it on a regular basis. However, with the rise in cyberthreats, it would be good to consider using one in the future as you surf the internet and boost your security….

Can Businesses Trust Third-Party Tech Vendors Like Cloudflare?

Last month, for the umpteenth time in recent memory, a prominent web service was forced to issue a warning to users: change all of your passwords. This time, those potentially affected included anyone unfortunate enough to have used websites serviced by content delivery company …

How to Train Your Staff on Workplace Cybersecurity

In today’s world, there’s no doubt that cybersecurity is crucial for the sustainability of any business. But are you really doing enough to keep your data safe from the hackers that want to steal? Take note that, when it comes to security, your employees are…

Tech.Co Top Stories: Mentors, Cybersecurity, and SXSW Startup Night

Spring has sprung! The birds are chirping, the sun is shining, and entrepreneurs around the world are crawling out of their home offices in search of food that isn't Doritos. And if you were out in the world enjoying some sunshine, you might have missed some…

Expanding Life Insurance Startup Fabric Offers Easy, Affordable Coverage

Life insurance startup Fabric, a service designed to aid the 37 million American families without life insurance, just expanded coverage across 32 states. Plans start at six dollars a month for $100,000 in coverage. How does a life insurance company qualify as a startup? …

5 Cybersecurity Strategies Businesses Need to Implement in 2017

Despite the prominence of cyber-attacks nationally, from politics-to-healthcare, most companies are doing little to protect themselves from hackers. According to Symantec, there were more than 429 million identities exposed in 2015 alone. Companies are at a higher risk of …

Artificial Intelligence Startups Are Winning the Cybersecurity Race

A new era of AI began around 2010. Computer power capacity significantly increased and neural networks could be integrated into a GPU chip that enabled calculations to speed up experiments. Also, the rise of smartphones and cloud storage services allowed for the consolidation …

Study: Edtech Needs to Be More Secure Than It Is

Ed tech — the software, hardware, and integrated systems that are increasingly powering every level of education — has sprung up quickly around the world. The industry is getting crowded enough that we were able to cover a top 12 list of the highest funded…

6 Security Areas Fintech Needs To Patch This Year

If there ever was a tech revolution that is impacting every corner of the world, it is fintech. Traditional financial institutions are being forced to re-think their products and services. Previously unbanked individuals are now getting banked through mobile providers. Personal …

4 Simple Ways to Protect Your Smart Home From Hackers

Towards the end of 2016, a series of massive DDoS attacks took out some of the internet’s biggest websites, including PayPal, CNN, Reddit, Github, Netflix, Twitter, and many others. The attack billed as one of the biggest in the history of the internet, was…

7 Ways to Avoid Getting Hacked Via Public In-Flight WiFi

As Jet Blue starts to unveil its newly improved in-flight WiFi, and other airlines inevitably start to follow, passengers need to be aware that they are just as vulnerable in the air as they are on the ground. Public WiFi can pose serious risks…

4 Cross-Platform Antivirus Tools You Should Try Right Now

We live in a digital world – unfortunately not a very secure one. Despite security companies being around for a long time, digital security is still a major concern for businesses and households. The problem is even worsened with the rise of mobile devices….

Tech.Co Top Stories: Net Neutrality, Phoenix Startups, SXSW, and VR Trolls

With more snow than a Game of Thrones winter, the last week has been a flurry of excitement for tech enthusiasts, conference junkies, and snow blower salesmen around the country. But while you were sledding and getting excited about SXSW, Tech.Co was churning out…

You're Really Going to Miss Net Neutrality

The internet is currently in its “wild west” phase. Illegal downloads, cyber attackers, and unregulated content roams free through this vast digital dystopia. Governments and corporations have widely debated the best ways to curb this unchecked power held by …

3 Sports Tech Startups Win NFL Funding to Address Safety Concerns

For years, the NFL has had to own up to accusations of unsafe play. With retired players developing the symptoms of CTE and the increased amount of injuries to current players, the future of football is constantly in flux. The NFL understands that safety is…

8 Ways to Build Up Your Cybersecurity Defenses

Yahoo announced a security breach late last year, totaling over a billion compromised accounts. According to The New York Times, critics said the internet company giant “has a long way to go to catch up to these threats.” Not only must companies better their…

Survey: Americans Have Kinda Just Given Up on Cybersecurity

Two results from the latest survey at the Pew Research Center paint a dismal picture of the typical Americans' approach to cybersecurity. As it turns out, many U.S. citizens tend to distrust modern institutions' claims to secure their data while at the same time…

5 Types of Apps to Get in 2017 for Better Security

Despite the fact that mobile takes over desktop not only in media consumption but in business as well, mobile device security is still taken rather lightly by the majority of users, as it seen from the recent survey. Mobile security breaches are on the…

Intelligence Officer Answers Ransomware with Cybersecurity Product

Whether you're a business owner or a simple consumer, having a plan for ransomware is no longer an option; it's a necessity. Fortunately, Cybereason, a cybersecurity company that traditionally focuses on building military-grade cyber tools for enterprises, has announced a …

9 Ways to Further Distance Your Business From a Cyber Attack

You may have certain methods in place to protect your business from a cyber attack, but are you really as protected as you need to be? With hacks and data breaches becoming more and more common, you may want to think about giving your security…

How the Internet of Things Could Save the Insurance Industry $6 Billion

Insurance companies love collecting data on their clients. The Internet of Things loves gathering data through every smart device. A match made in tech heaven? That's what ROC-Connect thinks: It's partnering with CoreLogic in order to help insurers bring IoT devices to market. …

Spinbackup Improves Cloud Cyber Security Solution

Even though it's under the spotlight, many users don't completely trust cloud computing and storage. Security is an issue, as they fear for the safety of their data, especially given that hacks are a staple of the nightly news as of late. Companies share this…

Blink Launches Seecurity: A DIY Home Security Suite

Today, Blink is announcing a full suite of hardware being added to their do-it-yourself home security offerings in anticipation for CES 2017. A Kickstarter success story, the company initially launched with a wireless, battery powered cameras designed to monitor your home. Last …

Law Firms and the Front Lines of Cyber Security

A devastating hack can strongly affect any business, but is especially hard for law firms. Their reputation depends on how much their clients trust them, so having someone leak mountains of sensitive documents about their clients can ruin any law firm and destroy the…

FindFace Now Allows You to Search Twitter Users by Their Face

When someone wants to look for a specific user on Twitter, it's likely that the first thought is to use the network's search tool. There, one can search by name, username, or by content. But sometimes, this just isn't enough, making searches too time consuming…

Netatmo Presence Uses Algorithms For Better Outdoor Security [Review]

Break-ins happen, regardless of how much security you have visible to the would-be criminal. However, comprehensive and effect security measures can certainly reduce the chances. When I was growing up, home security was available in the form of horribly annoying keypads that …

Is There Still Too Much Risk For Smart Home Adoption?

The Internet of Things has become a huge seller in the tech world. There are apps for everything from watching your dog while you're at the office to WiFi-connected garage door openers. Everything from hi-tech baby monitors to multi-colored lights are available to turn your…

Download Torrents More Safely With These 4 Tips

Torrents have a bad reputation, as they are usually associated with illegal downloads. However, the truth is that they can be much more useful than what appears. One of torrents' best features is that, most of the time, download speeds are quite faster than…

3 Biggest Threats to Your Tech Startup in 2017 and How to Fight Them

On Facebook and Twitter, via newspapers and blogs, or just over a coffee during the office’s morning break – every day we’re bombarded with a ton of news, and it’s rarely ever good. Whether it’s Brexit pulling all our jobs out from under our feet…

5 Reasons Instant Messaging Makes Sense for Businesses

Instant messaging, also known as IM, is a special kind of online chat that provides real-time text communication with the help of the Internet. Instant messaging has been used for more than 25 years now, but the fact is that this form of communication…

5 Ways to Avoid Fake Shopping Apps

According to the National Retailer Federation, 36% of shoppers plan to purchase items on Cyber Monday, up from 34 percent in 2015, and total spending is expected to exceed $5.8 billion between Black Friday and Cyber Monday. While Cyber Monday brings a wide range of deals…

The Top 10 Hacks of 2016

This year has been a rough one. Between a contentious election and celebrity deaths, 2016 has been dubbed one of the worst years ever. And, unfortunately for the digitally vulnerable, hackers have taken this sentiment to heart by committing some of the worst cyber…

Internet Providers Could Be The Answer To Better IoT Security

A recent group of researchers in Virginia hacked into a driverless car to demonstrate how easily it can be accomplished. This study was actually commissioned by several governmental groups that are deeply concerned about the explosion of IoT devices and the opportunities that …

This Innovative Lockbox May Revolutionize the Real Estate Industry

While the real estate industry is one of the most important industries in any country, technological innovations have yet to hit it hard. Other than a few apps, which can be dubbed as client management tools, the industry has not enjoyed a true technological revolution …

Daplie Is the World's First Private In-Home Server for Consumers

The cloud has completely transformed the business world. With every business form, file, and style guide available anywhere in the world, the remote work movement has begun and made life so much easier for employers and employees alike. From editorial teams to customer service…

How to Make Sure Your Business Messaging System Is Secure

Making the decision to incorporate an instant messaging system into your business is extremely beneficial. There are few things more important in business than effective communication between employees and employers. If you are not able to effectively communicate with your …

Online Payments Are Simple and Secure With Fintech App Trustly

Shopping on the internet is common place for most users, but online payments still scare a lot of people, particularly payments made with credit cards. Whether its because of simple ignorance on the matter or an unwillingness to pay for all the fees often associated…

5 Reasons Why Small Businesses Need Cyber Security

According to The National Cyber Security Alliance, one out of five small businesses is affected by cybercrime each year. Worse, 60% of those hit go out of business within six months after the attack. In most cases, the potential consequences of a cyber-crime are immense…

U.S. Intel Is “Confident” Russia Hacked the DNC to Influence Election

The Department of Homeland Security has released a statement: The U.S. government has now officially blamed the Russian government for attempting to influence the upcoming 2016 election by hacking into the U.S. government. Here's the statement, presented jointly from both the …

How Startups Are Providing Healthcare Access to U.S. Patients

Startup companies who specialize in providing better access to healthcare have become incredibly popular in recent years. The reason? According to Inc.com, The Affordable Care Act has transformed the old model of treatment-based care and replaced it with a value-based model. …

5 Tech Tips for a Safer Online Dating Experience

The days of organically meeting potential love interests are nearly gone. The rise of dating apps, online dating services, and even social media messaging have left random human interactions in the dust. Although millions of online daters successfully meet others on a daily …

Essential Online Security Tips for Product Owners

There are many reasons to outsource your software development project. For one, there’s usually a cost saving. In addition to this, contracting out development helps avoid the management hassle of overseeing a dev team. Finally, this practice allows you to continue focusing on …

5 Surprising Cybersecurity Risks on Social Media

Practically everybody uses social media these days. In fact, the average person is on social media nearly two hours a day. Since people use it so frequently, they’re often woefully unaware of all the security risks they face. Here are some things both businesses…

Hackers Stole 68M Dropbox Accounts… 4 Years Ago

Dropbox's biggest hack happened in 2012. Files totaling 5GB with the details of 68,680,741 accounts were found online, and a “senior Dropbox employee” has confirmed that the leak information is legitimate, according to Motherboard. Dropbox has released a statement …

Negotiate Your Questionable Medical Bills with MedBill-IQ

The healthcare industry has been a bit of a mixed bag in recent years. While Obamacare has helped millions of people get covered, exorbitant copays and complicated networks have made it difficult for everyone to get the medical care they need on a regular basis….

5 Security Essentials for Ecommerce Sites

You work hard to get your customers to your checkout page. You offer quality products, invested money in a good marketing campaign, and set up a great website for displaying your wares and work hard on getting more customers on board. However, there's another important…

WeGoLook Will Check Out That Sketchy Craigslist Car For You

While on the road to finding the global Startup Of The Year for Innovate! and Celebrate 2016, we’re on a mission to feature and highlight as many rising stars as possible. From tech and hardware, to entrepreneurs improving the accessibility of health information, each month …

Catch ’Em All Safely with this Pokémon Go Insurance

There is one mobile game taking the world by storm, and we have all heard something about it: Pokémon Go. The extension of this Nintendo's franchise takes full advantage of what today's smartphones have to offer, and uses geolocation and augmented reality to take…

4 Ways Technology Can Better Your Home Security

More and more cases of home burglary are being recorded on a daily basis. Door locks, guard dogs, and intrusion alarms aren't getting the job done anymore and people are looking for an alternative. Fortunately, with the advent of smart home security technology, people can…

The Importance of Having Disaster Recovery Plans for Your Startup

No matter the size your startup, it's always important to prepare for potential security issues. You can easily take measures to reduce your risk of having a data breach disaster, but there are many other incidents that you have absolutely no control over, including…

Cyber Security Is an Absolute Must for Any Budding Startup

The world has become a global village thanks to increased internet usage. Unfortunately, this closeness and ease of accessibility has had an increasing effect on the world of cyber crime. It has made it easier than ever to access bank accounts, cheat on tests, and disrupt …

Elevate Your Brand With These 5 Image Design Hacks

Every good blog post needs a good header image. The header image is the first thing readers sees when scrolling through blogs, along with an eye-catching title. That’s why you want to get their attention with a header design that is not only nice…

Blink’s Wireless Monitoring and Security System is the One to Buy [Review]

Keeping an eye on your home, your family, and your furry little critters are not just an add-on, but a necessity. Security systems of yesteryear were cumbersome – requiring a professional to install the system, and coming with costly hardware and monthly services. But,…

Evolving Trends in Home Security Technology

Home security systems used to be really complicated. If you wanted the peace of mind that went along with motion sensors, a lawn sign and quick access to police, you had to be willing to pay a premium and often an accompanying monthly subscription….

The RNC Is Ready to Take on Cyber Attackers

After what can only be described as a Howard Stern-esque march through the primaries, Donald Trump will finally take the stage at the Republican National Convention this week. Between the crass comments, the racists diatribes, and sexist explosions, the Donald has proven that …

Simple Online Data Security Tips to Follow Now

Cyber attacks are a relentless threat to any data security. A halfway decent hacker has almost immediate access to most people’s data at any given time. And data can be compromised right in front of a user’s face without them even realizing it. Hacking…

Montana Based Cybersecurity Company Wins Startup Arlington Competition

Last month, we reported on the Startup Arlington Competition that will result in a new tech company moving into the area. Concluding the competition, Arlington Economic Development announced that Montana-based Oppleo Security is the winner. From a pool of more than 75 …

6 Major Failure Points for the Internet of Things

Deployment failures are often experienced by enterprises when they are exploring and implementing Internet of Things (IoT) solutions. This phenomenon has been experienced in various industries from healthcare, automotive to industrial equipment manufacturers. We try to point out …

The Internet of Things Is Perfect for Company Security

When you think of the Internet of Things, or IoT, you likely picture everything from smart homes to comprehensive entertainment systems – technology geared for consumers, not for companies. However, nothing could be further from the truth. Businesses can benefit from this …

Keys to Data Security for Business

These days, concerns about cyberwarfare and hacking seem to be bigger than ever. President Obama said that government and businesses must be vigilant about protecting themselves from hackers and criminals. Some small business may think that they are safe as hackers will aim …

Your Favorite Browser Plugin May Be a Major Security Threat

Browser plugins, extensions and other customizations can make your web browsing experience much more enjoyable, but they also run the risk of leaving your computer ripe for a malicious attack. Due to this, it is vital to be more aware of the pros and…

3 Strategies Defending Tech Companies Against Cyber Threats

It’s no secret that the risk associated with cyber-threats facing organizations of all shapes and sizes is growing. Remember that time CBS News reported that a hospital in Washington, D.C. was thrown back into the pre-computer, paper-based age by an attack on their central …

Why you should store your data in 3 separate locations

No one can accurately predict when a disaster is going to strike, but flash floods, power surges, fires and other catastrophes can severely cripple a business for days, weeks and sometimes permanently. In fact, 25 percent of businesses never reopen after experiencing a major…

3 Ways to Avoid Attacks to Your Website

The Internet is an amazing way to discover new things and communicate with others, but it is also quite an unsafe place, where attacks happen all the time. Website hacks can compromise the work of businesses and companies, especially by taking down the content…

The Cybersecurity Ecosystem Is Ripe and Striving

In the past 18 months, news has broken about several data security breaches that impacted thousands of people, caused embarrassment to many corporations, and resulted in both financial and privacy loss. Even celebrities have suffered public humiliation when their personal …

The Ultimate Guide To Protecting Your Online Identity

With social media having penetrated in all aspect of our lives, keeping your personal data secure and private becomes quite a challenge. Ebay, Evernote, Adobe, Court Ventures, the US Military and now notorious Ashley Madison are just a few companies who failed with keeping…

Study: You Can ‘Catch' the Online Fraud Germ

Online fraud is as much a part of the internet experience as “likes” and “retweets.” Whether it be Nigerian princes looking for social security numbers or social media hackers asking your friends' for money, there is no end to the methods of scamming …

Google's Latest Update Helps Combat Against Hacking

Google‘s reign as one of the most popular web companies is often unparalleled. From search engines to email engines, Google has dominated much of the Internet and everyday tools that users rely on. However, even Google has had difficulty with getting a handle on…

5 Cyber Security Threats For 2015

Currently, there are increasingly large numbers of cyber attacks in the nation. In fact, the FBI now ranks cybercrime as one of its top law enforcement activities. President Barack Obama, in his recently proposed budget, said that he would drastically raise the spending on…

The Ethics of Big Data

Big data generally refers to information that is either unstructured or multi-structured. Unstructured is information that is not easily interpreted or organized and it has to be micro-analyzed in order to turn that data into value for businesses and government. It can refer …

4 Cloud Security Lessons Startups Need to Learn

Does your business use the cloud? The cloud has become incredibly useful to businesses of all sizes and in all industries for a number of reasons. However, if you don’t have your cloud secured properly, you’re practically inviting hackers and even other businesses to…

10 Health and Safety Startups That Are Keeping You Safe

While aspiring to launch a successful startup may seem like the most important thing in the world to you, no one can get anything done without good health and guaranteed safety. Maslow's Hierarchy of needs even puts personal security on the bottom of the pyramid,…

Security for Smart Homes: Important Things to Consider

Many of us have seen the commercial. A young couple arrives at a vacation spot to which one set of their parents have already arrived. The dad asks if they secured the house before they left. Of course, they answer, “yes.” He then pulls…

Keep an Eye on Your Home Day or Night With D-Link HD Wireless DCS-2330L [Review]

Home security doesn’t have to cost an arm and a leg, and with the rise of the Internet of Things, hardware is becoming more affordable and accessible. From Nest to D-link there are countless options for keeping an eye on your home, sensing issues,…

5 Data Storage Steps Every Founder Must Take

Data is taking over. It’s the most powerful, most predictive tool available for business leaders, and the best ones are taking advantage. However, as we’ve seen with the Sony, Target, and U.S. government leaks, if disaster strikes your company’s data — regardless of …

5 Crucial Ways To Neutralize Cyber-Espionage

Cyber-espionage has become more and more common. Companies find that their servers have been hacked and that closely-guarded corporate secrets have been stolen more often than many people realize. But cyber-espionage goes beyond the boardroom — governments are also victims …

The Biggest Problem with the Internet of Things? Hint: It's Not Security

Security is a major concern with those who are watching the development of the Internet of Things. You can read plenty about how security problems are going to be the death of the connected world. After all, no one wants to drive a connected…

Easy and Cost-Effective Secure App Development

Every year, we see a considerable increase in the number and severity of cybersecurity incidents from which companies suffer major financial losses, harm to their reputation, and irreparable damage to their customers. In 2015 alone, cybercriminals raked in billions of dollars …

Smart Homes: What Are the Security Risks?

The Internet of Things industry is one step away from going mass market. While the smart home industry is currently estimated to hit $58 billion in worth by 2020, not all the consumers feel equally excited about smartifying their homes. Creating bulletproof security is…

6 Simple Yet Effective Tips for a Secure Smartphone

Today's smartphones are almost equal to computers in terms of utility. Be it storing important files and folders, accessing your work emails or online banking, this handheld device gives you access to anything and everything when connected to internet. Thus, it is of utmost…

Analyzing the Ashley Madison Data Breach: Could Your Company Survive?

Ashley Madison’s data breach has gripped the imaginations of people around the world since the news first broke at the end of July. While much of the public has spent their time commenting on how both the website and its members are getting what they…

Why the Panama Papers Were Too Big to Change the World

The Panama Papers were the largest data leak in the history of cyber attacks. 2.6 terabytes of information consisting of 11.5 million documents detailed the off-shore accounts of politicians, drug lords, celebrities and sports stars. When news original hit in April, news sources …

Big Data is Not Penicillin

The last few seasons in the online business industry has seen a great deal of sexy work being penned on the merits of so-called “Big Data.” Although there are many advantages to Big Data, it should not be looked at as a cure-all for…

5 Cybersecurity Threats Businesses Should Watch Out for in 2016

From phishing attacks to new and creative malware to infected laptops, cyber-crime is globally growing at an alarming rate. These cyber criminals are not just targeting the blue chip companies and large corporations as the media reports. According to Symantec, 43 percent of …

6 Essential Online Security Measures to Implement Today

Cyber crime, data breaches, and technology leaks are no casual thing. It's a sad reality your business might face if you stay unprepared. Not only it can cost you a pretty penny, but blow up your reputation and trustworthiness among customers.  Stay ahead of the…

What Converged Infrastructure Means for Today's Businesses

Many organizations are currently undergoing a significant shift in how they operate, particular when it comes to IT departments. The idea is to slowly but surely move away from the traditional data center technologies that have been in use for years. With the traditional…

Study: Half of American Corporations Are Vulnerable to Hackers

With the Panama Paper being released to the public and a recent hacker hitting major email accounts across the world, cyber attacks are on everyone's mind. And while you might think this surge in hacker activity would keep corporations abreast of the latest security…

Cyber Security: Protocols Every Business Must Know

Ever since the dawn of Internet, network security has been a complicated subject. Not everyone can tackle security threats or website infiltration and those who do are well-trained and experienced. Protecting and securing sensitive data from unauthorized access is crucial and failing to do...

Huge Email Data Breach Means Your Passwords Aren't Safe

Emails have been hacked and your passwords aren't safe. And while a data breach seems to happen every month or so, this one is for real. Seriously, this particular hack is going to take down all your accounts, and your important information is going to be in the hands of …

Cydersoft Uses Machine Learning to Battle Fraud-Bots

Machine learning is, as simple search for news can prove, a hot topic in the tech industry. Its varied applications make machine learning truly unique: from the existing ones, such as disease prediction or loan assessment, to future applications, like generating videos from …

Study: Nearly Half of All Businesses Have Bad Backup Habits

We all know how hard it is to protect ourselves from threats like malware or ransomware when surfing the Web, just as it is hard to avoid any physical damage to our computers and their components. All these things can potentially cause the loss…

The Dos and Don'ts of Being a Good Digital Citizen

Just like in the real world, people also belong to one or more online communities in the digital world, which grants them their digital citizenship. As digital citizens, we have various rights and responsibilities; ideally, good online citizens should always act with respect …

Your Router is One of the Latest DDoS Attack Weapons

If you woke up one morning to find your car had been stolen, that would be bad. If you found out your stolen car had been used to drive through the front windows of three businesses, that would be worse. And if it just…

8 Online Security Tips for Startups

A report, published by Moya K. Mason highlights the fact that there are approximately 150 million startups being launched every day by 300 million people the world over. Out of these, only one-third make it to the first three months after the initiation process.;…

Lessons Learned From MLB Cardinals Hack

Last month, The New York Times reported that the St. Louis Cardinals were under investigation by the F.B.I. and Justice Department prosecutors for hacking into the Houston Astros database that houses internal discussions about trades, player statistics and scouting reports. How …

Allay Helps Smaller Companies Provide Health Insurance

Unless your ears are welded shut, you know that healthcare is a pressing issue in the US. Whether it's the political discourse pertaining to a single-payer system or the desire for a repeal of Obamacare, the need for citizens to have affordable access to healthcare…

Stop Worrying, (Most) Mobile Apps Are Now Safe

If you are an avid WhatsApp user, you surely noticed the recent encryption disclaimer (that can be seen in the screenshot shown below) following one of your recently sent messages. But what does this notification actually mean? This encryption secures chats between the sender…

SpotCam: This New Cloud Camera Is Getting Traction

The landscape of home security market is teeming with cameras that promise to keep an eye on your family or pet or properties. Most of them claim to be cloud based and let you see live video on your mobile device whenever internet if…

Shortening URLs Can Be Harmful for Cloud Services

Link shortening sites such as bit.ly and goo.gl are most popular, with condensing URL links especially popular for social media sharing. However, the research conducted by Cornell Tech professor Vitaly Shmatikov and Arvind Narayanan showcase a disturbing effect of these URL …

Here's What I Learned After Being Attacked by Ransomware

Earlier this week, I was attacked by ransomware. It's a new type of malware that encrypts the vast majority of files in a computer. PDFs, image files or Office documents are just some examples of the targeted files. In most cases, the only way…

Can your Car Be Hacked?

Recently I purchased a new car.  My wife and I were having a baby and our old car, a ‘97 Ford Taurus had transmission issues, the speedometer didn’t work, and had 250,000+ miles on it. I strongly suspect it had way more than that,…

Keep Your House Safe with these Gadgets

We usually have a strong sense of insecurity towards of house, even though we like to think about it as our stronghold – especially while we are away. If that absence period lasts for a few days or weeks than the feeling that something…

Security Matters: How to Ensure Your Productivity Apps Are fully Protected

Security is a full-time job, especially in the digital age. While a secure network is a great start, companies large and small often use third-party apps to connect, communicate, and stay productive. For instance, my team utilizes productivity apps on a day-to-day basis to…

The 3 Best Mobile Monitoring Solutions for Parents

If you have kids, you know that “screen time” is a matter you face each day, an issue facilitated by mobile devices. But you are not alone with your problem. According to a recent study signed by Pew Research Center, 92% of teens (aged…

5 Ways to Protect WordPress Websites from Hacking

WordPress is a developer-friendly and versatile content management system (CMS). This has been used by zillions of websites. On the one, it offers so many benefits, while on the other hand it also has some security shortfalls that can potentially be brought down by…

Small Business Checklist: 6 Steps for Cloud Adoption

From the way businesses are talking these days, the cloud is where it’s at. To be sure, cloud computing has certainly helped companies find new benefits that improve productivity, increase capabilities, and cut down on operational costs. Simply saying that businesses need to …

HAZON Solutions Switches Script on Use of UAVs

The use of drones is a controversial topic. Whether it's privacy laws or  military actions, UAVs (unmanned aerial vehicles) are the focus of arguments across the globe. But while generals and judges discuss the negative implications of this technology, HAZON Solutions has found …

Mach37 Cybersecurity Accelerator Announces Spring 2016 Cohort

The cybersecurity industry is predicted to double by 2020 and the DC metro area is the center of cybersecurity innovation in the US. Therefore it should be no surprise that the premiere accelerator for information security startups and entrepreneurs calls this area home. The …

9 Cost-Effective and Critical Security Tips for Startups

Target. Home Depot. Sony. What do they all have in common other than falling victim to major security breaches? They aren’t startups. When big names fall victim to data breaches, its big news, making smaller companies believe they aren’t likely to be a target….

What John Oliver Has to Say About Apple, the FBI, and Secure Messaging

John Oliver, the host of Last Week Tonight on HBO, dedicated his most recent episode to exploring the controversial debate surrounding Apple and the FBI. In it, he summarizes the debate, offers his own opinion – with which I agree, and gives secure messaging…

Linksys Adds Clustering, Improves Small Business Network Hardware

Running a small company often means everyone has a few shared roles that are outside of the regular scope of their work and experience. One day you might be playing office assistant instead of developing, the other day you might need to play technical…

Distil Networks Raises $21M to Expand Company

DC area cybersecurity company Distil Networks just announced $21M raised in a Series B Round. The round was led by new investor Bessemer Venture Partners, with help from existing investors Foundry Group, Techstars, ff Venture Capital, Idea Fund andCorrelation Ventures. This …

5 IT Skills You'll Need as the Internet of Things Becomes a Reality

People are usually looking forward to the next big technological revolution. There’s always a great deal of excitement as we envision what the world will look like in the future and the role technology will play in that world. Most experts agree that if…

Re: LastPass – Why are we Still Using Passwords?

Everybody had a minor freak out this week when we heard that LastPass was exploited and invaded by unknown parties. You’re all familiar with the story, so I’ll spare you a full rehash: according to the team they “found no evidence that encrypted user…

7 Reasons Why Data Protection Is Your Safety Belt

Can't find extremely important files on your computer? It’s pretty sad of course, but, to say honestly, that’s your fault. You can delete your own files accidentally or leave them exposed to everyone online. Today your information is easy to hack – even if…

Alarm.com IPO Expected to Hit June 26

The Vienna, VA based security IoT company Alarm.com’s IPO is expected to be available on Friday, June 26 after filing an S-1 form with the US Securities and Exchange Commission on May 22, 2015. Specific terms and a valuation has not been set for…

What Do Businesses Need to Know to Consider Cloud Storage?

For businesses, security is a top priority, and with such a wide range of potential threats to consider, how data is stored and managed can fade in importance compared with more immediate-seeming physical threats. But this is an area where all businesses need to…

UpGuard Analyzes Security of Top Dating Sites

There's some personal information that likely causes you to pause before blindly typing it into a website. You're probably not going to throw your Social Security number all over the internet, and for good reason. But most dating apps don't ask for this kind…

4 Tips for Securing Mobile Devices and Business Data

Everyone’s on your team got a smartphone. We live in the 21st century, after all. BYOD policy and corporate devices are a common, positive practice, right? Well, not exactly. According to a survey by Ipsos Mori, personal information on company and personal devices often…

Marble Security: The Bouncer Stopping Security Threats at the Door

According to Gartner, through 2017 about 75 percent of mobile security breaches will occur through apps rather than deep technical attacks on the OS itself. That's not anything new at this point, but it is a bit shocking to think about and it's something…

5 Technology Pitfalls Small Businesses Should Avoid

Most small businesses have a lot of pressure on them seemingly at every hour of the day. Not only do they have to compete against larger rivals, they also have to keep up with constantly fluctuating technology trends. Every year, new programs, systems, equipment,…

A Guide to Top Security Risks in Android App Development

Mobile application development is no child’s play. Protecting the privacy of app users is becoming one of the biggest challenges for developers due to myriad security risks. Android is the most widely used mobile operating system today, and this makes Google’s mobile app …

Why You Really Need to Worry About Cyber Security

With society practically running off computers and the Internet, cyber security is a real threat to many businesses and homes. Recent attacks have pushed lawmakers to try and approve legislation that will requires companies to raise their security in their computer systems. This …

Tech CEO Jason Hope on the Biggest Changes IoT Will Bring About

David H Deans recently published an article about how government initiatives are driving the growth of the Internet of Things, especially in the Asia-Pacific region. The article reveals several key facts, including the following: Data from the Internet Data Corporation (IDC) has …

The Pros and Cons Marketing with the Internet of Things

By 2020, smart gadget manufactures and suppliers will annually generate $ 300 billion in revenue. For those of you that don't know, that is a lot. With 26 billion connected devices worldwide, the Internet of Things will be the perfect marketing channel for a…

“Personal Privacy is Something we Need to Preserve”

Companies need to make money to survive, obviously, and I get asked a lot how they do that if they offer an app for free. The fact of the matter is, if you don’t pay anything for the services, the company actually monetizes the…

Google's New ‘My Account' Hub a Central Place to Manage Your Privacy

This morning, Google announced a new centralized hub where users can better manage their privacy controls. Simply called “My Account“, Google users can now easily and more efficiently manage their privacy and security settings for their various Google services, …

The Future Is Now: Revolutionary Home Tech Trends

Most of us have wondered what the future will look like: will there be flying cars and floating highways? How about a little pill that somehow contains a filet mignon and a nice glass of merlot? While these musings may still be the stuff…

Data at Risk: Is Your IT Security Strong Enough?

Symantec named 2013 the year of the mega breach, and for good reason. More than 1.5 million cyber attacks occurred in the U.S. — a 91 percent increase over the previous year. What Symantec could not have known at the time is that the…

5 Essential Tech Tips for Single Living

Moving into your own place sans roommates is a huge milestone. You’re part of a growing trend — 27 percent of Americans live alone now, up from a mere 5 percent in the 1920s. And the key to loving your bachelor/bachelorette pad is necessary…

Why Is User Generated Content So Important? [INFOGRAPHIC]

Are you making use of the content your users generate? If you're not, it's time to start. User-generated content is the key to keeping your brand relevant in the eyes of users old and new. Think about it: in the age of Web 2.0,…

Secure Enterprise Sharing Provider CapLinked Announces $3.5M Round

CapLinked, a secure enterprise sharing and storage provider, today has announced a new round of funding totaling $3.5 million. The round is led by Subtraction Capital, and includes investments from PayPal co­founder Peter Thiel, Indicator Ventures, and venture debt lender …

Enterprise Level Cyber Security from Digital Shadows

“You can no longer assume you're never going to be hacked. You have to assume that you will be,” says James Chappell, co-founder of cyber threat intelligence company, Digital Shadows. Founded in London in 2011 and coming off a recent funding round of $8 million, …

How Secure is Your Hardware, Actually?

Having a connected home is super cool, and it’s absolutely the way our society is trending these days. Before we know it the home will be filled with devices that fuel your personal Internet of Things (IoT), down to your refrigerator. There are some…

Notion: A Heightened Level of Consciousness for Your Home

If you took one look at the Denver based company Notion I would bet serious money that you would say something like: “Oh, it’s a home security system”. Now, to an extent you would be correct, but it goes well beyond that. Brett Jurgens,…

How Do VPNs Keep You Secure?

These days it seems all you have to do is turn on the TV or load up a news site to see a story about someone getting their identity stolen or bank account emptied. As technology advances it’s becoming increasingly easy for cyber criminals,…

STUDY: Majority of Americans Not Confident in Social Media Privacy

According to a report released yesterday by the Pew Research Center, the majority of adults in the United States (69 percent of them) aren't confident that social media sites like Facebook and Twitter will keep their personal data private and secure. The report by…

This 9-Year-Old CEO Knows more about Cyber Security Than You Do

Meet Reuben Paul. He has a black belt in in Kung-fu, is CEO and founder of Prudent Games inc., a gaming company that teaches users while they play, and very well established in the cyber security universe as “The RAPstar.” Oh and he’s only…

5 Cybersecurity Considerations for 2016

Startup CEOs should use the new year to evaluate their cybersecurity, especially since 2016 marks numerous concerns for business owners. The prominence of cybersecurity issues seems to grow. In an annual PwC, CIO, and CSO survey of more than 9,600 global executives, 41 percent…

Are We Overstating the Threats from Mobile Devices?

With all the benefits that are tied to Bring Your Own Device (BYOD) policies — greater productivity, higher job satisfaction, etc. — many may still wonder why some companies don’t wish to pursue it. After all, BYOD could end up saving businesses money in…

AOL is Acquired by Verizon For $4.4 Billion

AOL Inc. will be acquired by Verizon Communications Inc. for $4.4 billion dollars in cash. The acquisition was announced today by AOL's CEO Tim Armstrong. According to Verizon, this acquisition further drives its LTE wireless video and OTT (over-the-top video) strategy. The …

5 Tips for Keeping Your Data Secure in the Cloud

For business owners, the thought of sensitive customer information or corporate data being exploited is horrifying. Worse, we’ve all seen it happen. Celebrities, corporations, and individuals have all had sensitive data stolen from the cloud and used for purposes of identity …

7 PC Security Practices to Safeguard Your Personal Info

There are many threats to your computer’s security. Don’t wait for an attack to strike: protect your computer with the best antivirus software you can find. Good PC security practices ensure that your personal information remains safe. Learn how these 7 PC security tips…

Kids and the Web: 5 Safety Tips Worth Implementing

We live in an amazing world where toddlers learn via iPad apps and a 17-year old kid sells his app for $30 millions to Yahoo. The worldwide web gives our kids access to loads of amazing educational tools and absolutely free knowledge we have…

5 Tips to Keep Your Gmail Account from Being Hacked

My computer has yet to be hacked, knock on wood, but after recently hearing a hacking horror story that happened to a colleague of mine it got me thinking, how do I prevent my accounts or specifically my email from being hacked? All too often…

5 Tips for Secure Online Shopping During the Holidays

Christmas is coming. Retailers have started aggressive sales tactics via email offers, banner ads, hot calls, and who knows how else? These pre-Christmas sales may hide scam schemes, phishing tactics, and malwaretising. Considering that you'll likely be online shopping, you must …

5 Network Security Tips You Should Implement Now

Cyber attacks are no joke. As reports of security breaches at small and medium-sized companies continue to escalate each week, making double-sure your company’s network is well-protected has never been more critical. Here are 5 actionable network security tips you should …

Hidden Cameras VS Employees' Rights: What You Need to Know

Did you know that 245 million cameras were installed in 2014? A good chunk of these have been installed in businesses across the United States, including in offices, construction sites, and retail outlets. The practice of installing closed-circuit television to monitor employees …

Why Internet Services Like Facebook Keep Going Down And What It Means

As recently as September, Facebook went down for less than an hour. Contrary to expectations, this did not actually lead to the end of civilization and the beginning of the End Times. But distressed users flocked to Twitter, made jokes about going outside and…

Hackers Are Getting to You Through Those Online Ads

If you didn't know, hackers buy advertising traffic on par with ads publishers. And you should think twice before clicking on any of the online ads you see on the Internet. The latest research from The Media Trust shows that video ads have recently…

3 Ways to Get Rid of Old Computers Without Getting Hacked

With Black Friday looming and Christmas coming quicker every year, technological FOMO is set to hit peak levels. And once you’re happily set up with a bargain-priced tablet or laptop, the temptation to throw out your old hardware (out with the old!) is hard…

The 10 Fastest-Growing Startup Industries in 2014

Cloud is old news, right? Think again – cloud computing topped Mattermark‘s list of the fastest-growing startup industries in 2014, far ahead of the pack. Mattermark measures industry growth by looking at the growth of individual startups, taking into account …

5 Facts That Will Win over Any Apple Pay Skeptic

Apple’s March 2015 Spring Forward event didn’t disappoint. The presentation is full of the usual fanfare for Apple fanboys and fangirls, including new products, new observations, and new insights. But it also packs a punch for business owners around the world. While some …

Secure Messaging App Wiper Now Allows Bitcoin Transactions

Alright, so I think we can all agree mobile messaging is still a pretty hot topic. With acquisitions like Facebook buying WhatsApp late last year, everybody is trying to get their own slice of the pie. Which means one thing, if you want to…

4 Mobile Trends to Watch Out For During SXSW

It's clear that the opportunities for startups focused on the mobile space are endless. By 2017, mobile phone penetration will rise to 69.4% of the global population. Statistics also show that consumers actually prefer mobile apps vs mobile sites, and people spend an average …

Even Apple Pay Can't Protect Your Identity

What security measures have you taken to protect your identity? Whatever measures you have taken, chances are, it is probably not enough. That is the sad reality of this present age, and likely, the age to come. The bad guys are getting smarter at…

9 Ways to Protect Your WordPress Site from Hackers

The grim truth is there is no way to completely protect yourself against hackers and security threats towards your WordPress website or blog. A determined hacker will find his or her way into your system whether you like it or not. It is up…

A Market Lesson for Photo Storage Startups

Recently, Casey Newton from The Verge discussed the seemingly inevitable doom of photo storage startups, reminding us of the list of companies that failed to make the name for themselves in this market. Indeed, over the last few years, there have been several interesting…

Security Concerns After Zero-Day Attacks in Adobe Flash

Try as we might, no system or program can be made 100 percent hacker-resistant. Cyber attackers are a crafty bunch, always deploying the latest technology and constantly changing techniques to infiltrate systems and steal or corrupt data. In the aftermath of major security …

Obama's Cyber Security Initiative: 5 Things You Need to Know

President Obama signed an executive order, urging tech companies to share information that could be threatening to the nation's cyber security with the government. The order was signed during the first White House Summit on Cybersecurity and Consumer Protection at Stanford …

The IT Team is Your Company’s Secret Weapon

Most every company has an IT team, or at least one IT expert in place. Although their job responsibilities are key for keeping the company running smoothly, most employers still don't understand how to keep them working at an optimal level. Not only that,…

Is Your Smart Meter Compromising Your Home Security?

Let's face it, everyone nowadays is looking for new and better ways to save power. After all, it's a win-win for everyone – you save money on your utility bills, all while saving our fragile planet. The smart meter is one of the main…

Selling Your Smartphone? 4 Ways to Reduce Security Risk

I've never personally sold my old cellphone to a stranger on the Internet. Something about handing off all my bad selfies, questionable Snapchats, and direct access to my bank account makes me a little uneasy. People do all the time though, so it must…

Mobile Security Platform LaunchKey Announces $3M Seed Funding

Cyber security and the subsequent cyber terrorism is today's hottest topic. That's why the announcement that Las Vegas startup LaunchKey, the first decentralized mobile authentication and authorization platform built for the post-password and Internet of Things era, has closed …

Twitter Launches Tool to Prevent Online Bullying

Twitter wants to stop the trolls. The social network released a new set of anti-harassment tools that make it easier for users to flag abuse on the network. Twitter has been previously criticized not implementing stricter rules against trolls, so this is an important decision …

Why Hackers are Actually the Good Guys

For the purpose of simplifying complex issues and characters in our society, the media has successfully vilified hackers today. Just look at the news in the past year and notice how hackers have been portrayed as the perpetrators of everything that is wrong with…

The Biggest Security Concerns with Social Media You Need to Know About

Even the most effective and useful tools can present dangers for your company. Take social media, for example. Businesses can now connect with and reach out to their customers in a manner never before imagined a couple decades ago. This open line of communication…

President Obama Supports Net Neutrality and Why You Should Care

Update: Read FCC response to President Obama's statement here. US President Barack Obama announced today his support for “free and open Internet” rules to ensure that no service is stuck in a “slow lane” without paying a fee. He urged the independent Federal …

The Impact of BYOD on Business Continuity

Disasters happen and there’s no way to prevent them completely. That’s a sad reality that many business owners have to face. Whether it’s a severe outage, a natural disaster, or some other unforeseen catastrophe, even the best preventative methods aren’t enough to stay …

Tech Tools That Keep a Freelance Blogger Safer Online

Those bloggers who get around a little, both in the physical and digital world, need to take greater care of themselves. There are a number of harmful sites, and people, out there and your mobility may be limiting your security. If you’re like any…

Monica Lewinsky On Cyberbullying, But We're All Responsible

With the rise of social platforms like Facebook, Twitter, Instagram, Snapchat, and Whisper, we've created more playgrounds for bullies to find and go after their victims. Today in Philadelphia Monica Lewinsky broke a decade of silence to share her latest mission, taking …

Secure Messaging & Email System Criptext to Showcase at IDB

Last week, one of Venture Hive's 2014 Accelerator companies, Criptext, was announced as one of the 16 most innovative startups to take part in Demand Solutions, an IDB conference taking place on December 2nd at the Inter-American Development Bank's (IDB) headquarters in …

5 Tricks to Keep Your Personal Photos Safe

There is an ongoing debate about online privacy due to the recent iCloud hack that targeted celebrities such as Jennifer Lawrence and Kate Upton, which lead to leaks of their private pictures on the web. Of course this is a terrible ordeal, but instead of…

Blaze's LaserLight: Slick Device That Warns Drivers of Urban Cyclists On the Road

If you're a cyclist, either for your daily commute or weekend rides, you know the dangers you face when sharing the road with drivers. According to the statistics, in 2012, 726 cyclist lost their lives in bicycle/motor vehicle crashes in the United States. In that…

Swift Programmers: Here's a New Open-Source Security Tool for You

The application security and research startup nVisium has just released an open-source training tool for developers wanting to build applications using Apple's new Swift programming language. Called Swift.nV, the tool is meant to help identify and test vulnerabilities in …

Net Neutrality Threats: Bad for Consumers, Deadly for Startups

Net neutrality is a hot-button topic, and for good reason. The Federal Communications Commission and the U.S. Supreme Court are rapidly pushing us toward a future eerily similar to the highly controlled media world of “The Hunger Games” by not supporting net neutrality. …

9 Security Risks for Your Work Phone

For the last couple of years, there has been a new trend and concept that encouraged employees to bring their own devices to work: BYOD. This concept has (some) benefits, namely, letting employees having the same device for work and private use and letting…

App Development Company 10Pearls Buys Gemini Security Solutions

This morning, it was officially announced that 10Pearls – a software app development company located in Herndon, VA – has acquired Gemini Security Solutions. The acquisition is largely motivated by the company's recognition that data be kept secure throughout the …

Boston Cybersecurity Company BioCatch Raises $10M Series A

It was announced this morning that the Boston-based cybersecurity company BioCatch has raised $10 million in a Series A round of financing. The round was led by Blumberg Capital and OurCrowd, with existing investors participating in the raise. BioCatch provides behavioral …

Cybersecurity Accelerator MACH37 Announces 60 Members to its Mentor Network

Yesterday, the Herndon, VA-based cybersecurity accelerator MACH37 announced the first 60 members in its mentor network, additionally putting out a global call for more members. Called the “Stars Network,” mentors include successful cybersecurity entrepreneurs, …

Computer Viruses 101: What You Need to Know Now

Computer viruses first emerged in the 1980s. Since then, they have posed problems for computer users worldwide. Unfortunately, most are here to stay. Computer viruses are now so common that even IT experts have a hard time identifying and monitoring these pesky cyber …

What Does Your Social Media Profile Reveal About You?

In many respects, social media has made it easier for us to communicate with each other: We are able to keep in touch with friends from around the world, we can easily update family members about what’s going on in our lives, and we…

What Every Small Business Should Know About BYOD

Employees working on their own smartphones or laptops at work has become a common sight in the business world. It’s all part of the growing trend of businesses adopting Bring Your Own Device (BYOD) policies. That’s where employees are allowed to bring in their…

The Top 10 Stories of the Week: Game of Thrones Android Apps, Damn Good Reasons to Startup in Peru, DC's Zoobean Gets Major Investments

Did you miss out on one (or five) of Tech Cocktail's posts from this week? It's okay. We want to let you know that we forgive you; we totally get it. You're a busy person, with a lot of things on your mind and…

Cybersecurity Startup Luminal Raises $600K from the State of Maryland, Closes $3.82M in Series A Funding

Cybersecurity startup Luminal has been awarded $600,000 from the Maryland Venture Fund's InvestMaryland, an economic development initiative set up by the state government and various venture capital firms, following its recent move from West Virginia to Frederick, Maryland. …

This Type of Malware Is Cyber Criminals's New Weapon

As long as the Internet and computers exist, malware will remain a threat to vulnerable PCs and devices. Most of us rely on our PCs or related devices on a daily basis, from work to leisure. Although this is good for enhancing communication and…

Cyber Security Breach: Phishing Site Steals Apple IDs

In yet another example of a cyber security breach, the EA server was recently hacked, and its website was used to host a phishing site intended to steal Apple IDs. Unfortunately, such online security breaches are becoming more common as hackers take advantage of…

What Every Business Owner Should Know About IT Security [Infographic]

As hackers, malware/spyware creators, and other maliciously-intended individuals learn how to get past security software programs, new algorithms are created in an effort to stay on top of the attacks. This constant security software evolution is meant to stay on top of viruses …

DC-Based Accelerator MACH37 Begins Second Class of Cybersecurity Startups

Last week, MACH37 began its Spring session with a new batch of cybersecurity startups. This is the second class of companies for the DC-based accelerator. MACH37 is an accelerator located at the Center for Innovative Technology in Herndon, VA. The incubator program is a …

Alexis Ohanian Comes To DC; Tells Startups 10 Ways to Be Awesome

Sure, Reddit cofounder Alexis Ohanian may be at my (and his) alma mater today, in Virginia, but we mustn't disregard the fact that it has been Alexis Week in DC.Currently sitting on Reddit's board, Ohanian is also the founder of Breadpig, an advisor to Hipmunk, an …

Organize Your Files Safely on SafelyFiled's Secure Cloud Storage

“Making the effort to be neat and organized is wasted unless you can easily find what you have organized,” CEO and cofounder of SafelyFiled Mark Snow explains. “After all, that's the real purpose of organization.” Staying organized in real life is difficult, but trying…

earHero: The World’s Safest Earphones

People love being connected to their devices through earphones, but being plugged in has its disadvantages – a report this year revealed that the number of headphone-wearing pedestrians seriously injured or killed near railways or roadways has tripled within six years. …

Pinstagram: Billion Dollar Mashup?

Pinterest and Instagram are two the of the fastest growing apps of all time. So I wonder what would happen if you combine them together? Pinterest + Instagram = Pinstagram That is exactly what the team of Brandon Leonardo and Pek Pongpaet did with the launch…

Spotflux: Aiming to Become Synonymous with Online Security and Privacy

It is safe to say that the Internet is the most incredible informational tool ever – and one that we rely on so much, I sometimes wonder how we survived without it. As it has evolved and grown exponentially, we have learned to take…

Lessons in Determination From SecQ.me Founder James Khoo

Three years ago, James Khoo’s sister drove her car into a tree and was knocked unconscious. She was hurried to the hospital with the help of passers-by, but Khoo and his family didn’t know what happened for several days. “Those 3 days were very…

Twitter Acquires Whisper Systems, an Android Security Firm

Twitter has acquired Whisper Systems, an Android security firm based in San Francisco. According to an announcement on Whisper Systems' blog today, they will become part of Twitter. They stated: “We started Whisper Systems with the goal of improving security and privacy …

Airbnb Apologizes and Looks To Beef Up Safety After Ransacked Apartments

I am a big fan of Airbnb. I like the idea of being able to turn any space into a potential rental unit for a would-be traveler. The young but successful business has been built around the notion that most people are good and…

Net Neutrality Rules Approved By FCC

Given the importance of an open Internet to our economic future…it is essential that the FCC fulfill its historic role as a cop on the beat to ensure the vitality of our communications networks and to empower and protect consumers of those networks.”  –…

Twitter Hacked Again? Security Issues Continue

Take it from someone who knows, as last night before getting my beauty sleep I got 10 emails from Twitter. They read something like this: Hey there. Due to concern that your account may have been compromised in a phishing attack that took place…

Did you like this article?

Get more delivered to your inbox just like it!

Sorry about that. Try these articles instead!

Jack is the Content Manager for Tech.co. He has been writing about a broad variety of technology subjects for over a decade, both in print and online, including laptops and tablets, gaming, and tech scams. As well as years of experience reviewing the latest tech devices, Jack has also conducted investigative research into a number of tech-related issues, including privacy and fraud.