Last Updated on 4 October 2023 by Daniel PDF files themselves cannot be “hacked” in the sense of being directly compromised. PDF is a file format, and like any other file format, it’s not inherently vulnerable to hacking. However, PDF files can be manipulated, exploited, or used as a vector for various types of cyberattacks.… Continue reading Can PDF files be hacked? If so, how can you mitigate?
Author: Daniel
I'm the founder and CEO of Lionsgate Creative, Password Sentry, and hoodPALS. Besides coding and technology, I also enjoy cycling, photography, and cooking.
https://www.lionsgatecreative.com
https://www.password-sentry.com
https://www.hoodpals.com
Password Sentry Licensing Update
Last Updated on 3 October 2023 by Daniel We have updated our licensing model. We are now open source. No plans. You can now get Password Sentry for FREE. However, we do charge a fee of $24.95 (USD) for our techs to install / reinstall / upgrade via Jobber app in Client Area. Password Sentry… Continue reading Password Sentry Licensing Update
Using truly secure passwords: 6 essential reads
Last Updated on 2 October 2023 by Daniel Jeff Inglis, The Conversation Editor’s note: the following is roundup of previously published articles. Passwords are everywhere – and they present an impossible puzzle. Social media profiles, financial records, personal correspondence and vital work documents are all protected by passwords. To keep all that information safe, the… Continue reading Using truly secure passwords: 6 essential reads
What is the typical profile of a hacker?
Last Updated on 1 October 2023 by Daniel There is no one “typical” profile of a hacker, as hackers come from diverse backgrounds and have varied motivations and skill sets. However, I can provide some general characteristics and categories that hackers may fall into: It’s important to note that the term “hacker” is broad, and… Continue reading What is the typical profile of a hacker?
What are good website security practices?
Last Updated on 30 September 2023 by Daniel Good website security practices are crucial for protecting your website and its data from various threats, including hackers, malware, and other cyberattacks. Here are some essential website security practices you should implement: Website security is an ongoing process, and it’s essential to stay vigilant and proactive in… Continue reading What are good website security practices?
What should you look out for in phone text messages to protect yourself?
Last Updated on 29 September 2023 by Daniel Protecting yourself in phone text messages is essential, as scams and phishing attempts often target individuals through text messaging. Here are some things to look out for: Protecting yourself from text message scams and phishing attempts requires vigilance and caution. Always think twice before taking action on… Continue reading What should you look out for in phone text messages to protect yourself?
How do hackers spoof IP addresses?
Last Updated on 28 September 2023 by Daniel Spoofing IP addresses is a technique used by hackers to disguise their true identity and location on the internet. It involves sending network packets with a forged source IP address, making it appear as though the data originated from a different machine or location. This can be… Continue reading How do hackers spoof IP addresses?
Remote workers are more aware of cybersecurity risks than in-office employees: new study
Last Updated on 27 September 2023 by Daniel Joseph K. Nwankpa, Miami University and Pratim Milton Datta, Kent State University Workers who telecommute tend to be more aware of cybersecurity threats than those who spend most of their time in a physical office and are more likely to take action to ward them off, according… Continue reading Remote workers are more aware of cybersecurity risks than in-office employees: new study
A national digital ID scheme is being proposed. An expert weighs the pros and (many more) cons
Last Updated on 26 September 2023 by Daniel Erica Mealy, University of the Sunshine Coast In 2018-19, identity crime directly and indirectly cost Australia an estimated A$3.1 billion. To address such costs, the federal government is proposing a national digital identity scheme that will let people prove their identity without having to share documents such as… Continue reading A national digital ID scheme is being proposed. An expert weighs the pros and (many more) cons
Fyre Festival II: a psychologist on why some people fall for fraudsters over and over again
Last Updated on 25 September 2023 by Daniel Yaniv Hanoch, University of Southampton If you’ve ever been scammed, perhaps you resolved to never allow someone to take you for a fool again. But research shows not everyone reacts this way and in fact some fraud victims go into denial. This might help explain why the… Continue reading Fyre Festival II: a psychologist on why some people fall for fraudsters over and over again