Blog

“The Travelers Guide To Wi-Fi Hacking”

Dear Blast Reader, Do you stay at hotels when you travel? Do you ever use the hotel internet? Did you know that there may be someone spying on you while you are in your hotel? Did you know that hackers target hotel Wi-fi? Did you know that the hackers that target hotel wi-fi also target

Posted in Business Professionals, Code, Computer Forensics, Cyber Security, Documents, Downloaad, Email, Email Address, Hack, Hackers, Hacking, Inexsmar Attack, Internet, Malicious, Malicious Code, Malicious Payload, Malicious Program, Malware, Malware Attack, Message, Payload, Phishing Attack, Phishing Email, Program, Public WiFi, Remote Access, Software, Trojan, Trojan Downloader Process, Trojan Malware, Virutal Private Network, Wi-Fi | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

“How Clean Is Your PC?”

Dear Blast Readers,   When it comes to your PC’s Cyber security do you do everything possible to prevent Cyber-attacks and data breaches? Do you use strong passwords? Do you know what constitutes a strong password? Do you avoid any suspicious emails that could lead you into a phishing attack? Do you use two-factor authentication

Posted in Back up, Banking Information, CDs, Computer Forensics, Cyber Attacks, Cyber Security, Data, Data Breach, Data Security, Desktop, Digital Information, Documents, Downloads, Email, External Hard Drives, Medical Information, Online, Password Portection, PC, Phishing Attack, Scams, Security, Software, Technology, Thumb Drive, Two-Factor Authentication | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

“Every Post You Make, Every Status Update, I Will Be Watching You”

Dear Blast Readers,   Do you ever feel like someone is watching you? Even when you are just sitting behind your computer? Feeling like someone is taking account of every keystroke that you make and every website you visit? This is the type of feeling that sends shivers down your spine. You don’t know who,

Posted in Anti-Stalking, Bank Accounts, Calendars, Cellphone, Computer Forensics, Computer Programs, Computers, Credit, Cyber Attackers, Cyber Attacks, Cyber Crime, Cyber Harassment, Cyber Security, Cyber Stalking, Devices, Email, Facebook, Instagram, Internet, Itineraries, Keystroke, LinkedIn, Online, Online Accounts, Phishing Attack, Privacy, Privacy Settings, Scare Tactics, Security, Security Software, Slander, Social Media, Software, Spyware, Twitter, United States of America, USA, Web Page, Website | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

“Don’t Let Your Independence Be Hacked”

Dear Blast Readers,   From everyone here at FDS Global we would like to wish you a Safe and Happy Fourth of July! As we celebrate this national holiday, Cyber Threats are continuing to get more advance.   The recent outbreak of the ransomware known as “Expetre” is not really a ransomware attack. It is

Posted in Confidential Information, Fourth of July, Independence Day, Master Boot Record, MBR, PC Computers, Ransom, Wipter Attack | Tagged , , , , , , , , , , , , , , , , , , | Leave a comment

“A Travelers Guide To Protecting Your Data”

Dear Blast Readers,   When you hear the word “summer”, what is the first thing you think of? Vacation? Travel? Did you know that most people wont leave home without their smartphones, tablets, and/or computers? Have you ever wondered how traveling can compromise your digital security?   People tend to think of vacations as a

Posted in Applications, Banking, Cloud Storage, Computers, Cyber Attackers, Cyber Attacks, Cyber Crime, Cyber Criminals, Data, Devices, Digital Devices, Digital Information, Digital Security, Digital World, Email, Flash Drive, Hotel Business Center, iPad, Keylogger, Mobile Devices, Network, Online, Smartphones, Social Media, Software, Tablets, Unauthorized Users, Virtual Private Network, VPN, WiFi | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment