<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Rubica - Medium]]></title>
        <description><![CDATA[True #CyberSecurity that finds threats — before they find you. https://rubica.com/ - Medium]]></description>
        <link>https://medium.com/rubica?source=rss----ee85ac200126---4</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>Rubica - Medium</title>
            <link>https://medium.com/rubica?source=rss----ee85ac200126---4</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Fri, 15 May 2026 15:51:34 GMT</lastBuildDate>
        <atom:link href="https://medium.com/feed/rubica" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Was your digital data compromised? Probably.]]></title>
            <link>https://medium.com/rubica/was-your-digital-data-compromised-probably-cfbf3fd66ba9?source=rss----ee85ac200126---4</link>
            <guid isPermaLink="false">https://medium.com/p/cfbf3fd66ba9</guid>
            <category><![CDATA[data]]></category>
            <category><![CDATA[family]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[digital]]></category>
            <dc:creator><![CDATA[Rubica]]></dc:creator>
            <pubDate>Wed, 30 Jan 2019 18:46:11 GMT</pubDate>
            <atom:updated>2019-01-30T18:45:52.614Z</atom:updated>
            <content:encoded><![CDATA[<h3>Colossal Collection #1 Cyber Breach Exposes 773 Million Email Addresses</h3><h4>Was your digital data compromised? Probably. Here is what you can do to protect yourself and your family.</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*N78iJfWMA_OIOVylsoU4Uw.png" /></figure><p>News of the “Collection #1” data dump has been circulating and reportedly contains 773 million e-mail addresses and 21 million passwords. While this information is troubling, we wanted to remind everyone of some best practices that can help mitigate the downside effect.</p><h3>What happened</h3><p>Security researcher <a href="https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/">TroyHunt</a> recently uncovered and analyzed a collection of e-mail addresses and passwords that has been dubbed “Collection #1.” In total, over 87GB of data contained a treasure trove of information that had been compiled from various <a href="https://krebsonsecurity.com/2019/01/773m-password-megabreach-is-years-old/">older data breaches</a>.</p><p>Want to see if your digital data has been compromised? Check out the site HaveIBeenPwned. It was created and is maintained by Hunt. It’s a great free resource people can reference to determine if their e-mail address has been included in a data breach.</p><h3>4 tips to protect yourself and your compromised data</h3><p>Data breaches and data dumps are all too common and these security incidents can create a sense of helplessness when it comes to protecting and securing your digital identity. However, there is good news. There are proactive things you can do to protect yourself, your cloud accounts, and your digital identity.</p><ol><li><strong>Update your digital password. </strong>If your e-mail address shows up as being part of a data breach on the <a href="https://haveibeenpwned.com/">HaveIBeenPwned </a>site, you should immediately change your password for any accounts impacted. Unique passwords that are long and strong go a long way to protecting your accounts from being compromised. Password managers, like <a href="https://www.lastpass.com/">LastPass</a> or <a href="https://www.dashlane.com/">Dashlane</a> are great way to manage all your passwords. [Learn more about <a href="https://rubica.com/how-to-create-strong-digital-passwords/">creating a strong digital password</a>].</li><li><strong>Use </strong><a href="https://rubica.com/multifactor-authentication-mfa-primer/"><strong>Multi-factor Authentication (MFA)</strong></a><strong>. </strong>Even if a cybercriminal has your password, if you have MFA enabled on your accounts, they can’t get in without that second form of authentication. Enable this additional security setting on your email, banking and financial accounts, iCloud/Apple account, online file sharing portals, and anywhere else where you can. [Here is a <a href="https://rubica.com/multifactor-authentication-mfa-primer/">primer on MFA</a>].</li><li><strong>Never use your personal information as the answer to security questions or account reset questions.</strong> Since bad actors now know your social security number, address, and date of birth (DOB),this information should never be used as an answer to security or account reset questions. Instead, use something random or, better yet, use a random sequence of numbers/letters/symbols as the answer.</li><li><strong>Beware of phishing related to the attack.</strong> With all these big data breaches, cybercriminals have a lot of useful information that can be used to compile full profiles on any specific individual. This personal dossier can be used to target you specifically. For example, a hacker can send you a convincing spear-phishing email with a link or attachment. That link or attachment may contain malware or lead to a phishing site designed to infect your device or steal your passwords to other accounts.</li></ol><h3>How can Rubica help?</h3><p>Cybercriminals will sometimes sit on this stolen information and use it later, so attempts to access your accounts or impersonate you may not be immediate. Keep Rubica running on all your devices for an additional layer of security.</p><p>If you’re a Rubica customer, Rubica can prevent known malware from being downloaded, block you from going to malicious sites unknowingly, and stop those sites or programs from accessing information on your devices or information you type while on those devices (i.e. passwords).<br><a href="https://rubica.com/rubica-private-client/">Rubica Private Client</a> customers have our concierge support team on call for any help you may need, now or later.</p><p>As an additional security measure, anytime you’re using public Wi-Fi, connect via Rubica’s virtual private network(VPN) to protect insecure connections. Doing this makes it harder for hackers to steal your login credentials or redirect your computer to a phony banking site. [Learn more about <a href="https://rubica.com/feel-safe-again-logging-onto-potentially-insecure-wi-fi/">feeling safe on public Wi-Fi</a>].</p><p>Not yet a Rubica customer? What are you waiting for? <a href="https://rubica.com/">Find the right plan for you today</a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=cfbf3fd66ba9" width="1" height="1" alt=""><hr><p><a href="https://medium.com/rubica/was-your-digital-data-compromised-probably-cfbf3fd66ba9">Was your digital data compromised? Probably.</a> was originally published in <a href="https://medium.com/rubica">Rubica</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[MAYBE YOU’RE SECURE ONLINE, BUT ARE YOUR KIDS?]]></title>
            <link>https://medium.com/rubica/maybe-youre-secure-online-but-are-your-kids-26306252744f?source=rss----ee85ac200126---4</link>
            <guid isPermaLink="false">https://medium.com/p/26306252744f</guid>
            <category><![CDATA[family]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[privacy]]></category>
            <category><![CDATA[kids]]></category>
            <dc:creator><![CDATA[Rubica]]></dc:creator>
            <pubDate>Wed, 02 Jan 2019 22:32:17 GMT</pubDate>
            <atom:updated>2019-01-15T00:33:41.643Z</atom:updated>
            <content:encoded><![CDATA[<h3>Maybe You’re Secure Online, But Are Your Kids?</h3><h4>The top 6 ways cyber criminals target your kids and what you can do to protect them</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*7i67hJxHedJzKKPp.jpg" /><figcaption>Rubica protected devices</figcaption></figure><p>Digital security is something that is often talked about as it relates to adults or businesses. However, cyber criminals do not have a problem targeting another group:your kids. A recent study by the Pew Research Center states that about <a href="http://www.pewinternet.org/2018/05/31/teens-social-media-technology-2018/">95% of teens</a> have access to a smartphone. And 45% state they’re online ‘almost constantly.’ With these kind of staggering stats, it is clear that cybersecurity, as it pertains to kids, is something that needs to be a proactive measure.</p><p>When you consider the <a href="https://www.wired.com/2017/03/hacker-lexicon-attack-surface/">attack surface</a> related to kids, the ways that they are attacked is no different than adults: smartphones, computers, social media, e-mail, and wearables. We’ll share ways your kids are at risk and then how you can protect them.</p><h3>Ways your kids are at risk:</h3><p><strong>1. Mobile apps &amp; games</strong></p><p>Kids of all ages play mobile games and use mobile apps –often even on their parents phones or tablets. Be cautious of free games and apps. Many include aggressive advertising (including gambling and dating site ads) and include links to download other games that could contain malware that can infect your devices. Some apps even gain access to the microphone, camera, or can automatically download unwanted items to your device without your knowledge. It may be worth paying more for apps with no ads. At a minimum, teach your kids not to click on ads and about protecting themselves with privacy settings. [Stay tuned for a study on kids apps we’ll be publishing soon].</p><p><strong>2. Social media</strong></p><p>Social media sites are a great way to stay connected, but can also make private data public or expose your children to cyber-bullying. These sites also have incredible reach, so if kids aren’t careful with privacy settings, it can be easily accessed by cyber criminals. Facebook experienced a data breach that exposed information for about <a href="https://techcrunch.com/2018/09/28/facebook-hack-instagram-facebook-login/">50 million accounts</a> and it is unclear whether or not attackers also gained access to Instagram accounts — Instagram is reportedly used by <a href="https://blog.hootsuite.com/instagram-statistics/">72% of teens</a> each day.</p><p><strong>3. Websites</strong></p><p>Websites sometimes ask for personal identifying information like birthdate, middle name, address or even family details. This could be used not only to steal their digital identity, but also yours. A fashion social website for teens, i-Dressup, experienced a <a href="https://www.app.com/story/money/business/consumer/press-on-your-side/2018/08/05/teen-site-dressup-nj/909835002/">data breach</a> that exposed information about children, including information about children under the age of 13.</p><p><strong>4. Identity theft</strong></p><p>Kids are just as at risk as you are to experience identity theft. According to Javelin Strategy &amp; Research, in 2017 more than 1 million children were involved in some type of <a href="https://www.cnbc.com/2018/04/24/child-identity-theft-is-a-growing-and-expensive-problem.html">identity theft</a> or fraud.</p><p><strong>5. Smart devices</strong></p><p>There is no regulation around smart devices. Unfortunately, when products are new to market, security is often the last thing device makers prioritize. A popular smartwatch by MiSafe was recently discovered to be <a href="https://www.hackread.com/misafes-smartwatch-hackers-track-childs-location/">vulnerable to hacking</a>, which could allow an attacker to track the movements of a child and/or listen to conversations. Other smart devices have given away location data through breaches. Do you want cyber criminals knowing your child’s location?</p><p><strong>6. Public Wi-Fi</strong></p><p>The more kids rely on computers and smartphones to access digital content, the more tempted they are to access public Wi-Fi in hopes of preserving cell data or getting faster browsing or downloading speeds. The problem with accessing public Wi-Fi is that malicious attackers can set up rogue Networks (e.g. a duplicate Network at Starbucks named “Starbucks Wi-Fi”).These Networks can allow attackers to monitor your traffic and potentially intercept any credentials you type into apps or websites (e.g. e-mail, social media, or banking accounts).</p><h3>How to protect your kids online</h3><p>These examples outline various ways that children can be affected by cybercrime. That said, here are some tips you can follow to protect your children from cybercrime:</p><p><strong>Secure your kids digital accounts:</strong></p><ul><li><strong>Use </strong><a href="https://rubica.com/how-to-create-strong-digital-passwords/"><strong>strong passwords and never reuse passwords</strong></a><strong>.</strong> Use passwords with at least 14 characters, has upper case and lowercase letters, numbers, and at least one special character. Another option is to use a password manager like LastPass or Dashlane. The problem with using simple passwords such as 123456 or password, is that malicious attackers know that people like to use memorable passwords. This gives them the opportunity to easily guess your password and gain access to your online accounts.</li><li><strong>Enable </strong><a href="https://rubica.com/multifactor-authentication-mfa-primer/"><strong>Multi-factor Authentication</strong></a><strong> on all online accounts.</strong> <a href="https://twofactorauth.org/">Two Factor Auth</a> provides a great site with instructions on adding MFA to many popular websites and social media services. That way even if a cybercriminal has your password, if you have MFA enabled on your accounts, they can’t get in without that second form of authentication. You can’t rely on just a strong password.</li><li><strong>Monitor private settings.</strong> Secure digital accounts (particularly social media accounts) by <a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/best-practices-how-to-secure-your-social-media-accounts">ensuring privacy settings</a> are set correctly and linked 3rd party apps are kept to a minimum.</li></ul><p><strong>Protect your kids network:</strong></p><ul><li><strong>Use Rubica, a safe VPN, to secure your kids Wi-Fi connections.</strong> Rubica provides a secure and trustworthy connection through an encrypted channel between your devices and websites they visit using Virtual Private Network(VPN) technology. We hide their real IP address to anonymize their devices so it’s difficult for their online activities to be tracked or for their accounts to be hacked. Rubica also has built-in advanced threat protection to automatically protect their device and Internet browsing from threats.</li></ul><p><strong>Protect your child’s identity:</strong></p><ul><li><a href="https://www.consumer.ftc.gov/blog/2018/09/free-credit-freezes-are-here"><strong>Freeze your child’s credit</strong></a><strong>. </strong>It’s free to do as of 9/21/18. This will help ensure cybercriminals aren’t stealing their identity, which can create massive problems once they turn 18 and apply for credit.</li></ul><p><strong>Educate your kids:</strong></p><ul><li><strong>Teach them about the security risks that come with geolocation.</strong> Remind children that they should <a href="https://www.connectsafely.org/social-web-tips-for-teens/">be very cautious with sharing their location</a> with people on social media for their own physical safety.</li><li><strong>Teach your kids not to click on ads or suspicious links.</strong> Discuss the various types of <a href="https://rubica.com/malware-101-how-to-protect-yourself-from-different-kinds-of-malware/">malware</a> that can infect their computer/smartphone so your children know how to keep their devices safe.</li></ul><p><strong>Get Rubica — the strongest layer of protection:</strong></p><ul><li><strong>Installing </strong><a href="https://rubica.com/"><strong>Rubica</strong></a> on all your kids devices will be the most efficient approach you can take in securing your family’s digital life and devices. Any device (even when connected to public Wi-Fi) will be protected from phishing and malicious sites, malicious pop-ups and downloads, malware and device infection, man-in-the-middle attacks and Internet traffic interception while using Rubica. Rubica protects your family’s devices 24/7 from any location with both technical tools and a human cyber analyst team on the frontlines.</li></ul><p>Technology is a great way for children to learn and stay connected with family and friends. Although the cyber landscape can and does target children, the aforementioned tips can help ensure your children are safe while using their digital devices. For an additional layer of security, Rubica can protect your children’s devices from insecure connections, known phishing links, and known malware.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=26306252744f" width="1" height="1" alt=""><hr><p><a href="https://medium.com/rubica/maybe-youre-secure-online-but-are-your-kids-26306252744f">MAYBE YOU’RE SECURE ONLINE, BUT ARE YOUR KIDS?</a> was originally published in <a href="https://medium.com/rubica">Rubica</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Spyware, Trojans, Ransomware Oh My! What Are The Differences And How To Protect Yourself]]></title>
            <link>https://medium.com/rubica/spyware-trojans-ransomware-oh-my-what-are-the-differences-and-how-to-protect-yourself-b62c0fbf9722?source=rss----ee85ac200126---4</link>
            <guid isPermaLink="false">https://medium.com/p/b62c0fbf9722</guid>
            <category><![CDATA[privacy]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[malware]]></category>
            <category><![CDATA[software]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[Rubica]]></dc:creator>
            <pubDate>Tue, 04 Dec 2018 18:45:45 GMT</pubDate>
            <atom:updated>2018-12-04T18:45:45.556Z</atom:updated>
            <content:encoded><![CDATA[<h4>MALWARE 101: HOW TO PROTECT YOURSELF FROM DIFFERENT KINDS OF MALWARE</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Afnta-nUKkM_yxu8O6TUJw.png" /></figure><p>When it comes to technology and specifically cybersecurity, it can be overwhelming to keep all the tech terminology straight. Consider the various terms and acronyms that can be found in recent headlines: VPN, DDoS, Bitcoin, Zero-Day, and Data Breach. If you aren’t a cybersecurity expert, it can be easy to get confused with so many technical terms. Rather than try to explain every single term related to cybersecurity, let’s focus on defining one category — Malware.</p><p>The word malware has become synonymous with viruses and ransomware as a way to define some type of software that can infect and compromise a <a href="https://www.malwarebytes.com/malware/">computer/digital device.</a>However, it is important to understand all of the differences, so you can defend yourself against different malware variants.</p><h4>Spyware — how it spies on you, and what to do:</h4><p>Spyware is probably the easiest term to define because it does exactly what its name states — it spies on you. The ultimate goal of spyware is to gather information about users or devices. This can be done by tracking activity on your browser or computer or logging information (e.g. keylogger).</p><p>One of the most common forms of disseminating spyware to devices is via browser extensions, such as <a href="https://latesthackingnews.com/2018/06/11/google-chrome-warns-about-extensions-that-spy-on-you/">Chrome Extensions</a>. Recent discoveries by security researchers have found various Chrome extensions that spy on user browsing and social media habits. Other ways spyware is disseminated is via rogue/<a href="https://www.zdnet.com/article/500-android-apps-found-to-secretly-contain-data-stealing-spyware/">malicious apps.</a></p><p>At the bare minimum, the best way to combat spyware on a computer is to ensure you have an up to date Antivirus program running on your computer. In terms of combatting spyware on mobile devices, it is highly recommended that you don’t jailbreak your devices and only download apps from official channels such as the iTunes Store or the Google Play Store. While there have been instances where apps with spyware have circumvented Apple and Google’s security controls, it is still the best recommended practice to avoid 3rd party app stores because malicious attackers actively put compromised apps in these stores.</p><h4>Trojan –how it takes over your devices and what to do</h4><p>A <a href="https://us.norton.com/internetsecurity-malware-what-is-a-trojan.html">Trojan</a>, or Trojan Horse, is malicious software/code that can be used to gain control over a device. One key difference with Trojans is that it can’t replicate, as other viruses can. Some <a href="https://www.webroot.com/us/en/resources/tips-articles/what-is-trojan-virus">common types</a> of Trojans include: Backdoor, Exploit, Banker, and Remote Access. Trojans go a step beyond spyware with the end game of gaining access to your device for various reasons (e.g. exfiltrating data, remote access, etc.).</p><p>One of the most popular ways of disseminating Trojans is via <a href="https://enterprise.comodo.com/what-is-a-trojan-horse.php">e-mail</a>. We have all seen e-mails that contain a seemingly innocuous attachment such as a picture or video file. If the attachment is opened, it can allow a Trojan to be installed on your computer or smartphone.</p><p>As with Spyware, an up to date Antivirus program will help keep you protected from Trojans on a computer. In addition, being vigilant with what you are downloading or installing on your devices goes a long way to combatting accidental Trojan installation. It’s also better to download software directly from a company’s website (e.g. downloading a program from the actual website such as Slack from Slack’s website, Dropbox from Dropbox’s website, etc.)</p><h4>Ransomware — how it tries to hold you hostage, and what you can do:</h4><p>The most destructive form of malware is called <a href="https://us.norton.com/internetsecurity-malware-ransomware-5-dos-and-donts.html">Ransomware</a>. As the name implies, ransomware attempts to hold your devices/data hostage in hopes of scoring a ransom. Common forms of Ransomware encrypt your computer and display a notification that your files have been encrypted and in order for you to get the decryption key, you need to pay a sum of money, typically in <a href="https://www.washingtonpost.com/news/the-switch/wp/2017/05/15/what-you-need-to-know-about-bitcoin-after-the-wannacry-ransomware-attack/?noredirect=on&amp;utm_term=.f8666821cced">Bitcoin</a>, in order to protect the attackers from being tracked. Ransomware can be transmitted via a phishing link, an attachment in an e-mail, or a malicious program.</p><p>Luckily, several Antivirus companies have <a href="https://www.avast.com/en-us/ransomware-decryption-tools">decryption tools</a> for various ransomware variants that are free to download and use. The best ways to combat being infected with ransomware is to ensure you have up to date backups of your computer/devices and exercise strong cyber.</p><h4>But wait, it can get worse?</h4><p>Now that a basic baseline has been established for what’s the difference between Malware, Spyware, Trojans, and Ransomware, the real monkey wrench in all of this is that they can all be combined. For example, you may see a tip calculator app on a 3rd party Google Play Store that seems to have all of the functionality you are looking for, so you download it and install it on your Droid smartphone. What you have actually done is install an app that contains both Spyware and Trojan payloads within the app. The spyware component may monitor your GPS location and browsing habits. The trojan component may create a backdoor that could allow an attacker to gain remote access over your smartphone. This is where being vigilant with what you install on your devices comes into play and could have prevented the infection in the first place.</p><p>It can be overwhelming to navigate around all forms of malware that could compromise your computer or mobile device. Thankfully, there is a better solution that can act as a safety net for times when you may have a lapse in judgment and accidentally click on a malicious attachment or download a rogue app on your smartphone.</p><p><a href="https://rubica.com/">Rubica</a> provides an additional layer of security that can detect malicious malware like activity on devices (e.g. spyware behavior and data exfiltration). When it comes to your digital devices, these devices are essentially an extension of ourselves. Rubica provides peace of mind in knowing that you are protected from numerous digital attacks for a nominal price.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=b62c0fbf9722" width="1" height="1" alt=""><hr><p><a href="https://medium.com/rubica/spyware-trojans-ransomware-oh-my-what-are-the-differences-and-how-to-protect-yourself-b62c0fbf9722">Spyware, Trojans, Ransomware Oh My! What Are The Differences And How To Protect Yourself</a> was originally published in <a href="https://medium.com/rubica">Rubica</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[How to create strong digital passwords]]></title>
            <link>https://medium.com/rubica/how-to-create-strong-digital-passwords-263d9adf0886?source=rss----ee85ac200126---4</link>
            <guid isPermaLink="false">https://medium.com/p/263d9adf0886</guid>
            <category><![CDATA[tech]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[passwords]]></category>
            <category><![CDATA[data]]></category>
            <dc:creator><![CDATA[Rubica]]></dc:creator>
            <pubDate>Tue, 20 Nov 2018 00:31:08 GMT</pubDate>
            <atom:updated>2018-11-20T00:31:07.761Z</atom:updated>
            <content:encoded><![CDATA[<h4><strong>Why Your Password Can’t Be 1234</strong></h4><p>Cybersecurity is a cat and mouse game between users and malicious attackers. With all of the reports of data breaches and device exploits in the news, it can be difficult to fully understand what you, the user, can do to protect yourself from cyber attackers. As we have all learned, sometimes the simplest solution can be the best solution to a problem.</p><p>When it comes to password habits, it is staggering to see how many people use a variant of “1234” as either their entire password or part of their password. Security researcher, Troy Hunt — who is the creator of HaveIBeenPwned, released some mind-boggling <a href="https://www.troyhunt.com/86-of-passwords-are-terrible-and-other-statistics/">stats</a> around the number of weak passwords that have been part of data breaches and password dumps. This is a list of ten of the worst passwords Troy found:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*c67Gb8pYfCR1plBBlWKmpw.png" /><figcaption>Worst digital passwords</figcaption></figure><p>With a sample set of 6.8 million passwords from a data breach, 86% of those passwords were categorized as weak/terrible.</p><p><strong>What’s the big deal if I use “12345” as my password?</strong></p><p>You may be wondering, “What is the big deal if I want to use “12345” as my password?” The problem with using this type of password is that cyber attackers <em>know</em> that people like to use simple passwords such as this. This gives them the opportunity to easily guess your password and gain access to your online accounts.</p><p>To make matters worse, studies have shown that although people know that they shouldn’t reuse passwords, they still do. Earlier this year, <a href="https://www.darkreading.com/informationweek-home/password-reuse-abounds-new-survey-shows/d/d-id/1331689">LastPass</a> conducted a survey and found that in a sample set of around 2,000 users, 91% of the participants said they knew that reusing passwords is bad, but 59% of the participants said they reused passwords anyway.</p><blockquote>“91% of participants knew that reusing passwords is bad, but 59% of participants said they reused passwords anyway.” — LastPass Survey</blockquote><p>Whenever a data breach happens, cyber attackers will gather information about a user (e.g. name, e-mail address, exposed password, etc.) and then try the exposed password on multiple sites. For example, if an online retailer experiences a data breach and exposes passwords, an attacker can take the information from the data breach and try the passwords for a user on social media sites, banking sites, etc.</p><p><strong>3 tips for securing your password from cyber criminals</strong></p><p>Just like with sports, you don’t want to give your opponent an advantage. There are simple things you can do to ensure you’re not “low hanging fruit” for cyber attackers.</p><ul><li>Use a password manager to not only organize and maintain passwords, but also to create passwords. Password managers, such as <a href="https://www.dashlane.com/">Dashlane</a> and <a href="https://www.lastpass.com/">LastPass</a> have built-in password generators that create unique, long, strong, passwords.</li><li>Use a strong form of Multifactor Authentication (MFA). SMS is a weak form of MFA and should only be used as a last resort. Hardware such as a <a href="https://www.yubico.com/">Yubikey</a> provides the strongest form of MFA with an Authenticator App (e.g. Google, Microsoft, Authy) as the next strongest option for MFA.</li><li>If you don’t want to use a password manager, you can use a <a href="https://www.pcmag.com/article/359862/simple-tricks-to-remember-insanely-secure-passwords">mnemonic trick</a> to remember passwords such as the first letter from lyrics in a song or a phrase, and add a special character or two(e.g. TtLshiWwyauatwshLaditS$&amp; — Twinkle Twinkle Little Star).</li></ul><p>By following these tips, you can help ensure that your <a href="https://rubica.com/how-to-create-strong-digital-passwords/">password hygiene</a> is strong and ensure that you are no longer part of the low hanging fruit that cyber attackers can easily exploit.</p><p>If protecting yourself, your family and your data is important to you, <a href="https://rubica.com/">learn more</a> about how Rubica provides enterprise-grade cybersecurity for individuals, families and teams.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=263d9adf0886" width="1" height="1" alt=""><hr><p><a href="https://medium.com/rubica/how-to-create-strong-digital-passwords-263d9adf0886">How to create strong digital passwords</a> was originally published in <a href="https://medium.com/rubica">Rubica</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[How to protect yourself while shopping online on Cyber Monday]]></title>
            <link>https://medium.com/rubica/how-to-protect-yourself-while-shopping-online-on-cyber-monday-a4bffe23f6cd?source=rss----ee85ac200126---4</link>
            <guid isPermaLink="false">https://medium.com/p/a4bffe23f6cd</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[shopping]]></category>
            <category><![CDATA[cyber-monday]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[tech]]></category>
            <dc:creator><![CDATA[Rubica]]></dc:creator>
            <pubDate>Tue, 20 Nov 2018 00:26:50 GMT</pubDate>
            <atom:updated>2018-11-20T00:26:50.016Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*-QFHsiu1kBGVulEQU8dD4Q.png" /><figcaption>Protect your data and credit cards while shopping online</figcaption></figure><p>According to Adobe Analytics, a record <a href="https://www.practicalecommerce.com/sales-report-2017-thanksgiving-day-black-friday-cyber-monday">$19.62 billion</a> was spent online between Black Friday and Cyber Monday in 2017. There is no doubt that Cyber Monday is a great time to get cheap electronics and other potential gift items. However, it is important not to cheap out on your cybersecurity when you do your Cyber Monday shopping.</p><p>Malicious attackers know that people love a good deal and can target shoppers with the promise of cheap goods on a malicious site. With <a href="https://www.cnbc.com/2017/11/28/a-record-6-point-59-billion-spent-online-on-cyber-monday-making-us-history.html">$2 billion</a> of Cyber Monday’s sales coming from mobile devices last year, it is imperative that you take proactive steps to protect your purchases.</p><p><strong>Here are some tips to keep you safe on Cyber Monday:</strong></p><p><strong>Protect your Network:</strong></p><ul><li>Use secure WiFi connections. When at home, make sure your WiFi network is set up with WPA2 encryption. When using public WiFi, use a virtual private network (VPN) to protect insecure connections, such as a hotel or airport WiFi. Doing this makes it harder for hackers to steal your login credentials or redirect your computer to a phony banking site.</li></ul><p><strong>Protect your devices:</strong></p><ul><li>Ensure you have Antivirus installed on your computer and keep it up to date with the latest virus definitions. If you download any malicious files from a purported Cyber Monday website, an up to date Antivirus can help protect your computer.</li><li>Be mindful when clicking on links you may see on social media for Cyber Monday deals, as they could potentially be phishing links that will redirect you to a malicious website.</li><li>Make sure your browser (e.g. Chrome, Firefox, Safari) is up to date. This can help protect against known vulnerabilities that an attacker may leverage on a maliciously crafted website that has alleged Cyber Monday deals.</li></ul><p><strong>Protect your online accounts:</strong></p><ul><li>Don’t reuse passwords on websites. Each website should have a unique password. A password manager can help you keep your passwords organized. With the amount of corporate cyberbreaches, hackers have many people’s passwords. You don’t want them to use a stolen password to access your other accounts.</li><li>Use a <a href="https://rubica.com/how-to-create-strong-digital-passwords/">strong password</a> that is at least 14 characters long, has upper case and lowercase letters, numbers, and at least one special character. Common passwords like 1234 or password1 are too easy for cybercriminals to guess.</li><li>Add multi factor authentication (MFA) to all online accounts that offer this security option. <a href="https://twofactorauth.org/">Two Factor Auth</a> is a great website that has instructions on setting up MFA for many popular sites. If your password is compromised, accounts with MFA will require an additional step before a cybercriminal can gain access to your account.</li></ul><p><strong>Protect your purchases:</strong></p><ul><li>Use a credit card when you make Cyber Monday purchases. Credit cards have more protection under the Fair Credit Billing Act that make it easier to dispute fraudulent charges in the event your credit card is compromised. Additionally, you’re only on the hook for up to $50 when fraudulent charges occur on your credit card. Fraud protection for debit cards is not always as robust or easy to navigate compared to a credit card. You may run into problems when disputing charges on a debit card and it can possibly take longer to resolve.</li><li>If a Cyber Monday deal is only obtainable via Bitcoin, it may be in your best interest to skip said deal. While Bitcoin is a legitimate way of transmitting money, most online retailers aren’t actively accepting Bitcoin payments and there is no Bitcoin fraud protection. Don’t store your credit card on websites. Instead, store them in a password manager (e.g. LastPass, Dashlane) for easy use with “form fill/autofill.” This can help protect your credit card number in the event that website’s servers are compromised.</li></ul><p>Just as you protect your home with an alarm system, guard dog, and home owner insurance, it’s important to take precautionary measures to protect your digital identify, data, and privacy.</p><p>If you’re ready to keep your family safe and private in the digital world, Rubica’s <a href="https://rubica.com/">full-service cybersecurity solution</a> protects you from:</p><ul><li>Phishing &amp; malicious sites</li><li>Malicious pop-ups &amp; downloads</li><li>Malware &amp; device infection</li><li>Identity theft</li><li>Cryptocurrency-theft &amp; unauthorized crypto-mining</li><li>Man-in-the-middle attacks &amp; privacy threats (internet traffic interception)</li></ul><p>More than software with VPN technology, our cyber ops team — formerly with top security organizations like NSA, US Navy, and Scotland Yard — work from a US-based ops center to monitor your data 24/7 and identify threats based on your personal behavioral patterns.</p><p>Investing in <a href="https://rubica.com/">Rubica</a> and a password manager will not only protect your purchases, but also protect your family from cybercriminals.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=a4bffe23f6cd" width="1" height="1" alt=""><hr><p><a href="https://medium.com/rubica/how-to-protect-yourself-while-shopping-online-on-cyber-monday-a4bffe23f6cd">How to protect yourself while shopping online on Cyber Monday</a> was originally published in <a href="https://medium.com/rubica">Rubica</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[True CyberSecurity for All]]></title>
            <link>https://medium.com/rubica/true-cybersecurity-for-all-76d28e911702?source=rss----ee85ac200126---4</link>
            <guid isPermaLink="false">https://medium.com/p/76d28e911702</guid>
            <category><![CDATA[privacy]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[technology]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[hacking]]></category>
            <dc:creator><![CDATA[Roderick]]></dc:creator>
            <pubDate>Mon, 19 Nov 2018 20:59:13 GMT</pubDate>
            <atom:updated>2018-11-19T20:59:12.747Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/790/1*Zlgi52PhHfLnkjO-9oKisg.jpeg" /></figure><h3><strong>Introducing Rubica’s New Pricing Tiers, and the Rubica App with Advanced Threat Protection</strong></h3><p>Over the last ten years, my career and my focus has been on the biggest security challenges — whether this was within the four walls of government, the boundless environment of video gaming or on the physical frontiers of Afghanistan.</p><p>While the rapid advance of technology offers significant improvements to our lives, it has also created a golden age of criminal disruption. This crime is having a growing and pernicious effect on each of us and the society we want to live in.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*PPu4SgVfVqH_KQgWmqC5UQ.jpeg" /></figure><p>With Rubica, we set out to turn the power of technology towards solving the problem of cybercrime.</p><p>In the physical world a cop can only respond to one incident and protect one person. In the digital world we can replicate that cop millions of times to protect millions of people. The more people we protect with our digital thin-blue line, the less the criminals thrive.</p><p>Between my father and I, we’ve spent almost 50-years trying to prevent criminals succeeding and Rubica is the natural digital evolution of this family effort.</p><h3><strong>Introducing new pricing tiers!</strong></h3><p>Today I’m proud to <strong>announce the expansion of the Rubica service</strong> which makes our advanced cyber threat protection available to individuals, families and teams starting at just $39.99 per month:<a href="https://rubica.com"> https://rubica.com</a>.</p><p>This is the first time True CyberSecurity, <em>enterprise grade cybersecurity</em>, will be available to individuals.</p><h3><strong>The new App is here!</strong></h3><p>We are also excited to announce that a refreshed version of the Rubica App is now available in the App Store.</p><p>The updated Rubica iOS App (a similar refresh is coming soon for Android, Mac, and Windows) includes the following new features:</p><ul><li>A dashboard for viewing all the threats blocked</li><li>A view into the threats we have protected you from behind the scenes, for each device and user</li><li>Push notifications to alert you in real-time if a threat is blocked or detected</li></ul><p>Customers signing up with the new tiers get all of the advanced technical protection of the Rubica security stack (without the white-glove human, on-call element available to Rubica Private Client customers). Rubica’s advanced threat-detection automatically protects you from:</p><ul><li>Phishing &amp; malicious sites</li><li>Malicious pop-ups &amp; downloads</li><li>Malware &amp; device infection</li><li>Cryptocurrency-theft &amp; unauthorized crypto-mining</li><li>Man-in-the-middle attacks &amp; privacy threats (internet traffic interception)</li></ul><p>This protection is on all your devices, no matter where you are or what network you connect to, and is compatible with iOS, Mac, Windows OS and Android OS.</p><h3><strong>Who needs cybersecurity?</strong></h3><p>Every day, cyber threats become more sophisticated and bigger, and closer to home. With the rise in corporate hacks, threats to our physical security, bad actors and fake news — now is the right time to secure your digital life.</p><p>If you’ve ever used public WiFi at the airport, or let someone use one of your devices, or use the same password for more than one account, you are at serious risk.</p><p>We built Rubica’s enterprise-grade cybersecurity technology for people just like you because we believe the digital “you” has the right to be safe online. <strong>Your web-behavior, and how you interact with your devices, is an extension of who you are as an individual and is closely tied to your personal identity, interests, concerns and values.</strong> You have the right to keep your information secure, private, and protected from predators.</p><blockquote><a href="https://rubica.com/"><strong>I WANT PROTECTION NOW</strong></a></blockquote><p>Protect yourself, your family and your friends. <a href="https://rubica.com/"><strong>Sign-up today</strong></a> to protect yourself before holiday travel and online shopping kick into high gear.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=76d28e911702" width="1" height="1" alt=""><hr><p><a href="https://medium.com/rubica/true-cybersecurity-for-all-76d28e911702">True CyberSecurity for All</a> was originally published in <a href="https://medium.com/rubica">Rubica</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[3 TIPS TO PROTECT YOUR FAMILY FROM CYBER GHOULS & GHOSTS]]></title>
            <link>https://medium.com/rubica/3-tips-to-protect-your-family-from-cyber-ghouls-ghosts-2eca9ea6c1f4?source=rss----ee85ac200126---4</link>
            <guid isPermaLink="false">https://medium.com/p/2eca9ea6c1f4</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[halloween]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[tech]]></category>
            <category><![CDATA[privacy]]></category>
            <dc:creator><![CDATA[Rubica]]></dc:creator>
            <pubDate>Wed, 31 Oct 2018 15:57:43 GMT</pubDate>
            <atom:updated>2018-10-31T15:57:43.116Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*6J6pl1-xZ01HN3Cr7k-_tA.jpeg" /></figure><h4>This halloween season can be scarier than ever. Stay secure.</h4><p>The ghouls and ghosts who come to your house to trick or treat are harmless relative to cyber hackers. Here are three things you can do this Halloween season to protect you and your family:</p><h4>1. A little eerie…Siri is always listening to you…</h4><p>Ever wonder why you get ads and search results that seem to be reading your mind? If you have an iPhone, Siri (by default) is programmed to listen to every application on your phone and listen for your voice even if the phone is asleep. This means that Siri can mine information from your text messages, social media apps, and every other app installed on your phone.</p><p>To limit Siri’s psychic abilities to only the apps you need her for, go to Settings &gt; Siri &amp; Search. Scroll down and you will see a list of every app on your phone. For each app that you do not want Siri to spy on, click that app in the list and toggle off the Search &amp; Siri setting within it.</p><h4>2. Don’t let a skeleton in the backdoor…</h4><p>Both Apple and Microsoft will occasionally release updates for their operating systems (iOS, OS X, Windows). Even though they often advertise these updates for their user feature improvements, almost every update or new version also has a “security patch” included, which plugs a security hole that was found. If left unpatched, these holes can create backdoors for cyber ghouls to sneak through.</p><p>Similarly, all software programs should be kept updated and running the latest version — Outlook/Microsoft Office, Adobe, browsers like Chrome/Safari, etc. Turn on automatic updates for your software programs to automatically connect and update to patch vulnerabilities. If you no longer use a program (and therefore do not want to upgrade), then it should be deleted to eliminate that potential “backdoor.”</p><h4>3. If you use your pet’s name, kids name, or last address, the trick is on you…</h4><p>Cyber criminals know that we are lazy about passwords and often reuse them between sites or use easily discoverable personal information as part of our passwords (ex: DOB, kids name, pets name, address). This makes your passwords easy to crack, and if you use similar versions of the same password on multiple sites once one is cracked, they have them all. Never use personal info, or info that can be obtained from social media, in your passwords.</p><p>Answers to “Security Questions” or “Account Reset Questions” also should not include things like your mother’s maiden name or pet’s name. You can make the answers to these questions anything you want, so consider using something unique such as a randomly generated password from a password manager as the answer to these questions. This will help prevent someone from gaining access to your accounts (and locking you out) via resetting your passwords.</p><p>If you want to take your cyber security to the next level, <a href="http://rubica.com/">Rubica</a> can protect your family and all of your devices from the creepie and scary things lurking online.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=2eca9ea6c1f4" width="1" height="1" alt=""><hr><p><a href="https://medium.com/rubica/3-tips-to-protect-your-family-from-cyber-ghouls-ghosts-2eca9ea6c1f4">3 TIPS TO PROTECT YOUR FAMILY FROM CYBER GHOULS &amp; GHOSTS</a> was originally published in <a href="https://medium.com/rubica">Rubica</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Startup…without breaking the bank!]]></title>
            <link>https://medium.com/rubica/startup-without-breaking-the-bank-31705f4515b3?source=rss----ee85ac200126---4</link>
            <guid isPermaLink="false">https://medium.com/p/31705f4515b3</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[technology]]></category>
            <category><![CDATA[life-lessons]]></category>
            <category><![CDATA[business-strategy]]></category>
            <category><![CDATA[startup]]></category>
            <dc:creator><![CDATA[Rubica]]></dc:creator>
            <pubDate>Tue, 18 Sep 2018 17:53:10 GMT</pubDate>
            <atom:updated>2018-08-29T21:17:47.419Z</atom:updated>
            <content:encoded><![CDATA[<h4>Top 5 tips for securing your startup or small business</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*yWlCKtFOOZ0KV9uIeTvxAw.jpeg" /></figure><p>A common misconception is that security is something that you can worry about later when you’re a bigger company. After all, you have other <em>more important</em> things to worry about. Working in a startup or small business, there is always a staggering list of items that are categorized as critical for operations, but (unfortunately) cybersecurity is rarely placed on this list.</p><p>Another common misconception is that security is too expensive. However, integrating elements of cybersecurity in from the beginning is not only less expensive, but it becomes easier to maintain that security culture within your company long term. Your investors and customers will thank you!</p><p>Here are 5 practical, low-cost tools and practices that you can implement in your startup or small business which will make a huge difference in your cybersecurity posture:</p><p>1. <em>Enterprise Password Manager</em> — Implement for your whole team for nominal fees and it will more than prove its worth in the first year. By implementing a password manager system (managed and controlled by your IT team), you protect the credentials used for cloud accounts and backend systems. Good password managers also provide visibility into your startup’s users to see which folks exercise poor password practices (e.g. password reuse, weak passwords, etc.). Additionally, you can leverage Single-Sign-On (SSO) to simplify the onboarding/offboarding process, as well as securing login procedures.</p><p>2. <em>Fostering a Cyber Security Culture </em>— By making cybersecurity a part of your culture from the start, and making it <em>everyone’s responsibility</em>, you are setting your company up for success in the way that each employee does their job and the way that your infrastructure and services are set up. Create cheat sheets on ways employees can exercise “strong cyber hygiene” and regularly test adherence to these practices:</p><ul><li>How to create strong passwords (<a href="https://www.lastpass.com/password-generator">https://www.lastpass.com/password-generator</a>)</li><li>How you can add MFA to your online accounts (<a href="https://twofactorauth.org/">https://twofactorauth.org/</a>)</li><li>Send out phishing quizzes to all employees (new and old) to help educate them on ways to identify phishing e-mails (<a href="https://www.opendns.com/phishing-quiz/">https://www.opendns.com/phishing-quiz/</a>, <a href="http://blog.intronis.com/phishing-quiz">http://blog.intronis.com/phishing-quiz</a>, and <a href="https://www.sonicwall.com/phishing/">https://www.sonicwall.com/phishing/</a>)</li><li>Educate users on what <a href="https://medium.com/rubica/stay-safe-from-social-engineering-5d29679ecd09">social engineering</a> is (<a href="https://www.youtube.com/watch?v=lc7scxvKQOo">https://www.youtube.com/watch?v=lc7scxvKQOo</a>)</li></ul><p>3<em>. Check Each Other’s Work </em>— It is true that we have a blind spot when it comes to our own creations or things we work on. Because of this, it is important that you have someone else check your work, specifically for any server/backend configurations. The last thing you want is to have egg on your face because a server was misconfigured and data was exposed.</p><p>4. <em>Embrace Mobile Device Management (MDM) </em>— Protecting devices that connect to your company’s Network is absolutely mission critical. MDM “on the cheap” is viable with built-in tools like MDM capabilities in Office 365 and also MDM offerings within G Suite. The more you can protect your data and devices that connect to your Network, the more your potential attack vectors decrease.</p><p>5. <em>Real-Time Threat Protection</em> — Unfortunately, Antivirus isn&#39;t as effective as it once was and something more advanced is required to truly protect your endpoints and online activity from the barrage of always-changing cyber threats. Rather than spending a ton of money on enterprise-level intrusion detection and prevention tools (IDS/IPS), <strong>you can get this same level of advanced protection for a fraction of the cost by installing </strong><a href="https://medium.com/rubica/rubica-secures-9m-series-a-funding-787a24a30bda"><strong><em>Rubica</em></strong></a><strong><em> </em>on your devices.</strong></p><p><a href="https://rubica.com/">Rubica</a> protects phones, desktops, laptops, and tablets from infection and compromise, and also encrypts your connection to the internet no matter where you are or what network you connect to. With Rubica, all of your employees can be protected from <a href="https://medium.com/rubica/got-an-urgent-email-from-apple-support-read-this-before-you-click-3079bf93c526">phishing</a>, malware, <a href="https://medium.com/rubica/browser-hijacker-threatens-more-than-your-privacy-681f01bcf57e">browser-hijackers,</a> malicious sites/pop-ups, and other <a href="https://medium.com/rubica/you-dont-know-jack-cryptojacking-101-7a79970f2675">emerging threats</a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=31705f4515b3" width="1" height="1" alt=""><hr><p><a href="https://medium.com/rubica/startup-without-breaking-the-bank-31705f4515b3">Startup…without breaking the bank!</a> was originally published in <a href="https://medium.com/rubica">Rubica</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Did you read the Terms of Service?]]></title>
            <link>https://medium.com/rubica/did-you-read-the-terms-of-service-ad6d2f90a711?source=rss----ee85ac200126---4</link>
            <guid isPermaLink="false">https://medium.com/p/ad6d2f90a711</guid>
            <category><![CDATA[privacy]]></category>
            <category><![CDATA[terms-of-service]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[facebook]]></category>
            <category><![CDATA[vpn]]></category>
            <dc:creator><![CDATA[Rubica]]></dc:creator>
            <pubDate>Fri, 14 Sep 2018 21:49:35 GMT</pubDate>
            <atom:updated>2018-09-14T22:05:46.991Z</atom:updated>
            <content:encoded><![CDATA[<h4>If you’re going to use a VPN app, it is important to know what the app maker does with your data that flows through the VPN tunnel.</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/640/1*HD_z9vtWQ5ZfNorGUlLSTQ.jpeg" /></figure><p>Using a VPN (Virtual Private Network) can help protect your Network traffic from being intercepted while using insecure WiFi connections, such as coffee shops or hotels. If someone is going to use a VPN app, it is important to read the Terms of Service to familiarize yourself with what the app maker does with the data that flows through the VPN tunnel.</p><p><a href="https://www.wsj.com/articles/facebook-to-remove-data-security-app-from-apple-store-1534975340">Facebook recently removed their promoted VPN app, Onavo Protect</a>, from the Apple App Store after they were found to be in violation of Apple’s data-collection policies. Onavo Protect compiled user data into a database and then subsequently sold that info to third-parties. Additionally, Onavo Protect monitors the apps that are in use on users’ devices and sends that data back to Facebook servers. On the surface this data collection/sharing may seem insignificant, but it is counterintuitive when you consider that a VPN is supposed to protect your privacy.</p><p><a href="https://rubica.com/">Rubica</a> not only provides all of the benefits of using a traditional VPN, but also adds extra layers of protection against known phishing links, ransomware, and malicious redirects. Additionally, <strong>our team of 24/7 Cyber Analysts look for undiscovered threats and attack vectors in an effort to keep users safe</strong>. <strong>Rubica does not, and will not ever, sell any type of user data to third-parties. </strong>Any user data that is collected is anonymized, protected, and restricted on isolated systems. Additional information about our Data Security Policy can be found at: <a href="https://rubica.com/data-security-policy/">https://rubica.com/data-security-policy/</a></p><p><a href="https://rubica.com/get-started/">Contact us </a>if you have any questions about VPN data security or any other cyber security matters.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=ad6d2f90a711" width="1" height="1" alt=""><hr><p><a href="https://medium.com/rubica/did-you-read-the-terms-of-service-ad6d2f90a711">Did you read the Terms of Service?</a> was originally published in <a href="https://medium.com/rubica">Rubica</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Another T-Mobile Data Breach.]]></title>
            <link>https://medium.com/rubica/another-t-mobile-data-breach-cb3952cd83cc?source=rss----ee85ac200126---4</link>
            <guid isPermaLink="false">https://medium.com/p/cb3952cd83cc</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[privacy]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[data-breach]]></category>
            <category><![CDATA[data]]></category>
            <dc:creator><![CDATA[Rubica]]></dc:creator>
            <pubDate>Mon, 27 Aug 2018 19:46:23 GMT</pubDate>
            <atom:updated>2018-08-28T15:32:25.379Z</atom:updated>
            <content:encoded><![CDATA[<h4>Exposed customer information is useful to malicious attackers.</h4><p>T-Mobile representatives recently issued a statement regarding a <a href="https://www.t-mobile.com/customers/6305378821">data breach that occurred on August 20th</a>. This data breach resulted in T-Mobile customer information being exposed. The exposed data includes: billing zip code, customer names and account numbers, account types, and e-mail addresses.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ebajh31z4fgmxrhoCv9Yuw.png" /><figcaption><a href="https://www.t-mobile.com/customers/6305378821">https://www.t-mobile.com/customers/6305378821</a></figcaption></figure><p>While on the surface this may seem like erroneous data, <strong>it is actually very useful data to attackers, especially malicious attackers who specialize in porting scams.</strong> <a href="https://medium.com/rubica/port-out-scams-hijacking-your-phone-number-f9f30b701d7d">Port-out scams</a> involve an attacker transferring a users’ phone number to a different phone. This is often done in an effort to gain access to online accounts that are tied to a specific phone number.</p><p>If you are a T-Mobile customer, it is highly recommended that you closely monitor your account for unusual activity such as new phone hardware charges or new lines of service. Also, T-Mobile customers should be vigilant with monitoring for attempted phone number ports. <strong>The first indicator of a port-out event is when your phone stops having service and you’re unable to make calls or browse the Internet. </strong>T-Mobile customers can also <a href="https://www.t-mobile.com/news/unauthorized-porting-protecting-your-account">call customer support</a> to add a “porting pin” to help protect against potential porting activity.</p><p>With <a href="https://rubica.com/">Rubica</a>, you not only have protection for your devices, but you also have access to our cyber security concierge service. We are available to answer any cyber security questions you may have.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=cb3952cd83cc" width="1" height="1" alt=""><hr><p><a href="https://medium.com/rubica/another-t-mobile-data-breach-cb3952cd83cc">Another T-Mobile Data Breach.</a> was originally published in <a href="https://medium.com/rubica">Rubica</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>