Social Engineering, the Flaws of Human Error, and Methods to Defend from It | Data Driven InvestorSecurity Researchers know that Social Engineering is the key to a successful audit of a company and to obtain withheld information.Sep 10, 2020Sep 10, 2020
Published inDataDrivenInvestorWhy Encryption is Critical to Everyday Life? | Data Driven InvestorYou type in passwords almost every single day, the most basic form of encryption used in your life. Yet the question remains: how safe is…Feb 10, 20201Feb 10, 20201
Published inDataDrivenInvestorThe Catastrophic Effects of a Nuclear Electromagnetic Pulse (N.E.M.P.)You’re driving in your car on the highway, its rush hour and you have your songs blasting on the stereo system. You briefly check your…Jan 14, 2020Jan 14, 2020
Published inDataDrivenInvestorThe Horrors of IP Geolocation and How to Defend Yourself From ItAh yes. IP Geolocation, this is the 21st century’s way of telling companies if you’re driving or in your kitchen cooking SpDec 25, 20192Dec 25, 20192
Published inDataDrivenInvestorUnderstanding Your Risk for Various Phishing AttacksSo in a world of IoT (Internet of Things) its essential that one know the methods and risks of how a “Phishing” attack from a malicious…Dec 19, 2019Dec 19, 2019
Published inDataDrivenInvestorIn a World of Snapchat, Instagram, Facebook, and G-Mail… Be Very Very Afraid.As a recent research project in my cyber security education, I had to conduct an analysis of the privacy policies of Snapchat, Instagram…Dec 17, 2019Dec 17, 2019