In the last decade or so, there has been an overwhelming level of consumer and business adoption of smartphone devices. Whether it is for personal use, sharing files and photos, communicating, emailing, and gaming, or for business use, also sharing files, networking, emailing, conference calling, and increasing productivity, the sheer amount of smartphone internet usage that occurs on a daily basis nowadays by the general population is astounding. But with all of this new technological activity, most smartphone users are completely unaware of the safety, privacy and cyber security issues that come along with smartphone usage. The overall assumption is that a smartphone is a phone, and it’s not like a computer or laptop that is susceptible to hacking. Well this is a news flash for anyone who things that way – smartphones can be hacked too! This infographic, Mobile Security 101, breaks down how your smartphone and the contact lists and information inside it might have already been shared with someone without you knowing it.
This infographic was produced by Brainloop, an Enterprise Software and Services company providing electronic document compliance management. Consider safely sharing documents with Brainloop.com


You might be surprised to find out what common products now have RFID chips in side of them. RFID stands for Radio Frequency Identification and most commonly used on toll roads for collecting your credit card information as you pass through the toll without having to come to a complete stop. This has made driving on toll roads much more convenient, but that same technology can pick up an RFID signal from over 300 feet away. In fact, you might even have other RFID chips in your car that those same scanners could pick up and someone could find out more about you than you want them to know.
Did you know that many driver’s licenses and passports have RFID chips inside them too. This means that anyone with an RFID transmitter (which can easily be picked up on eBay) can find out who you are from the distance without even having to bump into you. The way it works is the transmitter will send a special signal to the surrounding area, and if any RFID chips are in the vicinity it will send back a ping along with the information it contains. Some crooks are using the RFID chips in your car keys to get access to your car while you are shopping. This is usually a two man team and it is much more high-tech than other forms of car theft, but it still happens. It should be noted that car’s with RFID ignition systems have had a 90% reduction rate in car thefts, but don’t think you are not vulnerable just because you have such a vehicle.
Securing a dedicated server or VPS is an ongoing process that can sometimes be overwhelming. Just as quickly as you find ways to keep would-be attackers out of your server, they look for new ways to get in. Above all else, it is important to be proactive and always look for ways to improve your server’s security. The following are 5 tips that should help you keep your server safe.
On the first row in the top-right corner of the System Preferences window, click on the Security icon. This will open your security preferences, where you can change all kinds of important changes.