Continue Reading

As AI Gains Intelligence, Necessary Regulation Lags Behind

“Artificial Intelligence (AI) is transforming the way we live and work, just like the internet did.”
Claims like these have become common in the media and academic journals. Large language models (LLMs) are algorithms that form the basis of this type of AI.

Continue Reading

Twitter and the FBI, sitting in a tree –

And they aren’t just k-i-s-s-i-n-g….. It’s much worse.

What’s being disclosed in the now-weekly Twitter releases certainly doesn’t improve the image of the FBI (and, of course, other 3-letter and 4-letter agencies).

Continue Reading

Google Paying $29.5 Million To Settle Lawsuits Over User Location Tracking

Google has agreed to pay a total of $29.5 million to settle two lawsuits regarding the company’s geographic tracking of their users.

LastPass Hack Update: Customer Information Accessed
Continue Reading

LastPass Hack Update: Customer Information Accessed

LastPass, the password storage service, has just revealed that customer information was accessed during the hack of their data that occurred at the end of August 2022. The data was stored with a 3rd-party cloud storage provider. Previously they had said that it was “limited to the LastPass Development environment in which some of our source code and technical information was taken.”

The Internet Patrol default featured image
Continue Reading

Mac Pro Tips: How to install yabai and skhd

In our last post, we briefly went over yabai, which is a tiling window manager for macOS. If you’re not experienced with Linux systems, the concept of a window manager (WM) is likely foreign to you, so I’ll pause briefly to provide an explanation and definition of a window manager, specifically a “tiling” WM.

How to Google like a pro
Continue Reading

How to Google Like a (Internet) Gangsta

Google has become an important tool for most people. Unfortunately, this tool’s power levels tend to take a sharp blow in the average user’s hands (fingertips?).

Biometrics such as the retinal scan is one of the ulti-factor authentication methods
Continue Reading

Multi-factor Authentication and Why You Need It

As the threat of cyberattacks keeps on increasing, individuals and organizations need to take the necessary steps to protect their data. One of the tried and tested ways of deterring data breaches is using multi-factor authentication, commonly known as MFA. The primary reason MFA is hailed as an effective method…

Does Private or Incognito Mode Make Browsing Anonymous
Continue Reading

Does Private or Incognito Mode Make Browsing Anonymous?

By now you know that your online activities are an open secret and can be tracked by various parties. While some users resort to deploying VPNs, others activate the incognito or private mode when browsing to keep their online activities away from prying eyes. So, how private is the incognito…

You can easily set up or change Gmail signature
Continue Reading

Gmail’s Spam Problem and What You Can Do About It

Google’s Gmail has been hailed as one of the best free email services around the world. Gmail has great security features, including 2-step authentication that provides industry-standard protection against hackers. In addition, it has robust spam filters, which will send all your bad incoming mail to the spam folder.

How to create a strong password
Continue Reading

How to Create a Strong Password

Every week there are reports of new data breaches, where massive amounts of personal information are leaked and exposed. Many of these data breaches revolve around unscrupulous people getting access to personal accounts as a result of weak or compromised passwords. Basically, a password acts like a gate or a…

Ransomware: Maze ransomware attack have become quite common
Continue Reading

The Cognizant Breach: What You Should Know About Maze Ransomware Attacks

Cognizant, an American company providing IT services based in Teaneck, New Jersey, is one of the latest victims of the infamous Maze ransomware. The IT services provider operating in more than 37 countries, with a turnover of $16bn, said the attack took place on Friday, April 17th. According to the…

Virtual meeting
Continue Reading

Zoombombing and Other Security Issues Surrounding Virtual Meetings and How to Prevent Zoombombing

Zoombombing and other security issues have become more common as web meetings and conference calls have become the new normal in the modern workplace. Though many people are aware of cybersecurity issues during online interactions, very few take virtual meeting security seriously. It is not uncommon for people to finish…

Personal data protection is about safeguarding consumer privacy
Continue Reading

Equifax Data Breach Settlement: What to Expect if you Submitted a Claim

The Equifax data breach in 2017 was one of the largest in history at the time to compromise private data. Surprisingly, the Atlanta-based credit agency did not detect the breach for six weeks. Equifax’s breach leaked out personal information which in some instances included driver’s license and Social Security numbers,…

zombie reaching 511 x 466-1
Continue Reading

Nearly Two Dozen Texas Towns Victims of Coordinated Ransomware Attack, Single MSP Vulnerability Suspected

A ransomware attack affecting 22 towns in Texas is believed to have had a single point of origin: a security hole, malware, or other weakness in a common, as yet unnamed, managed services provider.

Massive Capital One Breach of Data Stored on Amazon Affects Millions
Continue Reading

Massive Capital One Breach of Data Stored on Amazon Affects Millions

Capital One has revealed that it experienced a massive data breach of the personal data of credit applicants that was stored in the cloud on Amazon.