Image for post
Image for post
Photo from Morguefile.com

Much like the flowers in the above picture, when I finally ended my abusive relationship with my partner after a year and a half, I have remained in a closed state of mind since (and it’s been six years and not much has changed). Its traumatic: having your partner say “I love you” then a month later give you two black eyes and a week later give you fifteen bruises on your chest. She was a living nightmare, to this day if I hear the name she had, I shudder just a little bit.

I’ll go in depth about how to pick up on the signs of an emotionally or physically abusive relationship, so you can get the hell out as quickly as possible. The last thing I want is someone going through the same thing I had to go through. …


Image for post
Image for post

You type in passwords almost every single day, the most basic form of encryption used in your life. Yet the question remains: how safe is that password? Well if you happen to use a password that can be obtained from social engineering, such as the name of your dog with some numbers at the end, then it’s not very safe at all.

One of the world’s strongest passwords are AES-256 bit encrypted passwords and look like this:

4986DE8C6B2C0407EBB8832784DED21B0461521CD4E7FD4B (This translates to: DDIIsTheBest).

According to CNN, the world’s most common password in 2019 was 123456 (I’m not kidding).

The reality is no one is really going to use an AES-256-bit encrypted password and instead will use a generic password and recycle it on many different websites (I would never recommend this as it sets you up for a digital nightmare). …


Image for post
Image for post
Photo Source: Adobe Stock

You’re driving in your car on the highway, it’s rush hour and you have your songs blasting on the stereo system. You briefly check your smart watch due to a notification pinging your wrist.

Then suddenly your car stops functioning, your brakes stop working, and you’re idling forward. Panicking you safely pull over on the shoulder. As you check your phone, you notice it’s suddenly off and refuses to turn on, your smart watch refuses to turn on. …


Image for post
Image for post
IP Geolocation is one of the most prolific ways of tracking individuals.

Ah yes. IP Geolocation, this is the 21st century’s way of telling companies if you’re driving or in your kitchen cooking Spaghetti on the 14th floor of your apartment complex (I’m not kidding). In today’s world, the largest social media and advertisement companies utilize this feature every day. Most individuals don’t tell you how to avoid it or how to defend from it (because even turning off your location service on your phone is not enough) but in this article, I’ll give you some tips.

In a recent article, The New York Times did an investigation of how detailed the tracking of normal individuals is. Following the lives of several people, they found out that advertising companies (thanks to your Advertisement ID) were able to track a school teacher from her home, to work, to lunch, going from class to class, and how long she was stuck in traffic for. …


Image for post
Image for post

So in a world of IoT (Internet of Things) its essential that one know the methods and risks of how a “Phishing” attack from a malicious individual ends up being successful. In this brief article, I will explain the different types of phishing attacks that can head your way, and how to recognize them.

  1. Spear Phishing

A spear phishing attack is usually aimed at a high profile target, such as a CEO, CFO, CTO, or any chief manager of a facility/company. …


Image for post
Image for post

As a recent research project in my cybersecurity education, I had to conduct an analysis of the privacy policies of Snapchat, Instagram, Gmail, and Facebook.

Yes: I spent about four hours of my day reading the entire policy for said companies, and to be frank: it's scary how much they have on you. Let’s dig in.

  1. Facebook:

Facebook is guilty in several areas, the most notable being the Cambridge Analytica scandal, and the sudden epiphany that our data was being sold. Yet in reality, that was just the tip of the ice burg.

You see, Facebook is one of the many companies that when you press that checkmark and agree to use the site, you willingly consented to monitor and potential sharing of your IP Address, your device’s hardware, live GPS location tracking, and the kicker: the retention of your data…. …

About

J.S. Praecordia

Cyber Security student informing the world what they need to know (and should know) about their data, privacy, and security. Enjoy the dark mode profile!

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store