All in Tips & Best Practices

Choosing A Search Engine

There is no doubt that Google changed the world of the search engine and nothing made the resources of the Internet as accessible as Google. While it has over 90% of the global search engine market, some people have privacy concerns with using Google. This article provides an overview of those privacy concerns and shares some alternatives to using the search engine giant…

Take Control of Your Privacy with Global Privacy Control

The challenge of protecting the privacy of people online while still providing free services and content, is a challenge that has been met with many attempted solutions. Unfortunately nothing has really worked well to date but the pressures of privacy legislation like GDPR, (Europe) LGPD (Brazil) and CCPA (California) are pushing technologists to figure out how to have each individual communicate their privacy desires to the websites that they visit. he latest attempt and solving this problem is…

4 Steps to More Secure Password Use

Passwords continue to be one of the most hated parts of computing. Not only are they annoying to all of us who have to use them, but they also tend to be a common way that computers and online services are breached.

Here are some tips and links to previous BTH articles that will make your life easier and a lot more secure when it comes to authentication.

Have I Been Pwned?

In late 2013, after the Adobe data breach, Australian cybersecurity expert, Troy Hunt, created the free web service, HaveIBeenPwned (HIBP), “as a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or ‘pwned’ in a data breach.”

What does “pwned” mean? In this context, it basically means that…

Between The Hacks Mailing List

Do you check the Between The Hacks social media accounts hourly to see if there is a new post? Are you clicking refresh on your web browser in anticipation of the next blog? If so, Between The Hacks is ready to give you back some time because with the new BTH mailing list!

This email mailing list will automatically send you an email the morning after a new BTH blog post.

Since we respect your security and privacy, all we ask for is your name and email address. And, if you don’t want to share your name, you can lie and enter a fake name (don’t lie about your email address or you won’t get any email updates).

Sign up now and don’t miss another riveting BTH post!

October is Cybersecurity Awareness Month

In two weeks, the 2020 National Cybersecurity Awareness Month (NCSAM) will begin and Between The Hacks is a Cybersecurity Awareness Month 2020 Champion. Cybersecurity Awareness Month Champion organizations, which include companies, schools, school districts, colleges and universities, nonprofits and government entities, represent those dedicated to promoting a safer, more secure and more trusted Internet according to the National Cybersecurity Alliance.

For the month of October, Between the Hacks, along with hundreds…

Vulnerabilities Part 1: What Are Vulnerabilties?

About three months ago I started drafting a blog about vulnerabilities. This is a topic that I speak about frequently and is often misunderstood so I thought it would make for an easy and informative blog.

What I discovered is writing about this topic demands a lot more work than just speaking about it and this one blog has turned into many. So this week I am finally going to start a blog series on vulnerabilities where I will explain vulnerabilities at a level where the average computer user can understand the topic…

Pharming

Pharming is a type of cyberattack that redirects a website’s traffic to a malicious site that appears to be the real site. Pharming is used frequently in phishing attacks to trick a victim into sharing login credentials, banking information, or other sensitive data with the attacker…

Vishing

Phone scams are almost as as old as the telephone itself. In fact, most of us have likely been the target of a vishing attack but were not aware of the term, vishing. According to Proofpoint’s 2020 State of the Phish Report, only 25% of those polled were able to accurately define the term, vishing.

What Is Vishing?

The term, vishing is a combination of the word voice, and the word, phishing (voice + phishing = vishing).

Vishing is a form of phishing that uses voice calls rather than email, to trick a victim into divulging personal, sensitive or confidential information to an attacker...