The U.S. IoT Cybersecurity Improvement Act Becomes Law

An important step toward securing the Internet was achieved on December 4, 2020, when President Trump signed an IoT security bill into law. The Internet of Things Cybersecurity Improvement Act of 2020 has been in the works since 2017 and was passed by the U.S. House of Representatives in September 2020 and the U.S. Senate in November 2020.

The bi-partisan team that backed the IoT bill included…

Trump's Twitter Account Hacked...Again?

At a campaign rally in Tuscon, AZ on Monday, Donald Trump stated, “Nobody gets hacked. To get hacked, you need somebody with 197 IQ and he needs about 15 percent of your password.” The video quickly spread across the cybersecurity social media circles and generated a lot of attention. Today, Between The Hacks will dissect Trump’s statements, touch on some related news about a possible hack of Trump’s Twitter account, and share a few basic tips on how to secure your social media accounts.

OOPS!

If you are one of the 460 people who visited Between the Hacks on the morning of Monday October 19, you likely saw the weekly news post that was lacking a bit in, umm, detail. As you can see in the image below…

Choosing A Search Engine

There is no doubt that Google changed the world of the search engine and nothing made the resources of the Internet as accessible as Google. While it has over 90% of the global search engine market, some people have privacy concerns with using Google. This article provides an overview of those privacy concerns and shares some alternatives to using the search engine giant…

Take Control of Your Privacy with Global Privacy Control

The challenge of protecting the privacy of people online while still providing free services and content, is a challenge that has been met with many attempted solutions. Unfortunately nothing has really worked well to date but the pressures of privacy legislation like GDPR, (Europe) LGPD (Brazil) and CCPA (California) are pushing technologists to figure out how to have each individual communicate their privacy desires to the websites that they visit. he latest attempt and solving this problem is…

Choosing A Web Browser

The web browser is likely the most used application on your computer. In fact, many people have switched from a standard Windows or MacOS computer to a Chromebook which has one application, the Chrome web browser. With so much computing being done in a web browser these days, we are sharing some tips for choosing a web browser.

4 Steps to More Secure Password Use

Passwords continue to be one of the most hated parts of computing. Not only are they annoying to all of us who have to use them, but they also tend to be a common way that computers and online services are breached.

Here are some tips and links to previous BTH articles that will make your life easier and a lot more secure when it comes to authentication.

Have I Been Pwned?

In late 2013, after the Adobe data breach, Australian cybersecurity expert, Troy Hunt, created the free web service, HaveIBeenPwned (HIBP), “as a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or ‘pwned’ in a data breach.”

What does “pwned” mean? In this context, it basically means that…

BTH News 04October2020

This week on Between the Hacks, it’s Cybersecurity Awareness Month, potentially steep fines for paying a ransom, a New Jersey hospital pays a ransom to prevent sensitive data leakage, a warning about election misinformation, and a tool to test website privacy.