Cyber SecuritycybersecuritySocial Networking How to Protect Yourself and Your Children from Being Catfished"Catfishing" is a deceptive activity where a person creates a fake digital profile to engage…Michael GuadagnoOctober 11, 2021
Cyber SecurityPrivacySocial Networking How Do I Protect Myself Online?As more and more of us turn to online shopping and working from home, we…Michael GuadagnoMarch 25, 2020
Corporate EspionageFeaturedIdentity TheftMobile Device Security RiskOnline Content TrackingPrivacySocial Networking BYOC: The Mobile Cloud Computing Cyber Security ForecastAn outgrowth of Mobile Cloud Computing is BYOC (Bring Your Own Cloud). However, instead of…Michael GuadagnoMarch 28, 2013
FeaturedPrivacySocial Networking Do not give up your privacy so easilyIn late January, the European Commission published a proposal "on the protection of individuals with…Michael GuadagnoFebruary 10, 2012
Corporate EspionageFeaturedSocial Networking How Information on your Company’s Trade Secrets are CollectedYour company is being targeted. How? The spy office personnel start documenting any and all…Michael GuadagnoDecember 19, 2011
FeaturedSocial Networking Do Women Make Themselves the ‘Victim’?During the past week, I noticed one of my female friends was frequently uploading her…Michael GuadagnoJuly 5, 2011
FeaturedSocial Networking Many advertisers have included social media outreach in their campaigns for yearsMany advertisers have included social media outreach in their campaigns for years, but Wednesday’s arrest…Michael GuadagnoJune 23, 2011
FeaturedSocial Networking Software Creates ‘Fake People’ to Spread Message via Social NetworkingThe US government is offering private intelligence companies contracts to create software to manage "fake…Michael GuadagnoMarch 3, 2011
PrivacySocial Networking Suspicious wives make the best internet spiesWomen may struggle with handling the latest technology more often than men — but not…Michael GuadagnoAugust 17, 2010