A very interesting story has recently caught our attention; it is the tale of a technology journalist who had hackers wreak havoc on his online life. They were able to do this, in part, by exploiting security holes left open due to different companies’ security policies. Basically, they were able to take a little info from column A and use that to gain access to column B, and so forth. However, it was not only the security policies that left him susceptible to attack; he also had many of his online accounts linked to one another. This again allowed his attackers to get a little information from one area to gain access to another. This story is a good reminder to be aware of how your various online accounts are linked. And while users are unable to directly influence online companies’ security policies, it is helpful to understand how they work and what overlaps and gaps they afford. Below is a link to the full story which contains all of the fascinating details and has some great tips about online security.
- [easy_contact_forms fid=1]