Larry Bridwell Talks With CNBC’s Hamza Ali About ‘Insider Hacking’

Larry Bridwell, Sticky Password’s Global Security Strategist, chatted with CNBC’s Hamza Ali about ‘insider hacking’ – business IT systems being hacked or breached from inside the company. Cited in the article is an online poll of 300 IT decision makers conducted by Clearswift, a UK-based cyber security firm: a whopping 83% had experienced a data […]

Death by Passwords

Have you ever noticed that when you ask a friend how many passwords he or she has, the answer is almost always between 10 and 20? When you think about it, that really isn’t a lot, BUT they’ll go on to tell you how hard life is with all these passwords.* “So, how do you […]

Importing Firefox Passwords into Sticky Password

Add security to your passwords by exporting them from the web browsers you use into Sticky Password. Your passwords will be secure in the encrypted Sticky Password database. To import your Firefox passwords, right-click on the Sticky Password icon in the lower right corner and select Open Sticky Password. In the Main User Interface window […]

The Cognitive Dissonance of Online Security

Ever wonder about cognitive dissonance? You know, that confused moment as a child when you came across mommy kissing Santa Claus. (You had about a split second to decide whether to cry, or to tell on mom, or see if you could use the info to your advantage to wangle more loot from old St. […]

Passwords. Seriously. ! ? ;-)

With all the talk about security, do people really take passwords and security seriously? A recent headline tells us: New Password System at Springfield College Increases Security On the face of it, this seems to be a straightforward story of a business or institution – in this case Springfield College in Massachusetts – upgrading its […]

Top 4 Places You Might Get Hacked [infographic]

Today’s always connected culture has significantly increased the potential for hackers to breach one of your online accounts. It’s just as likely that you access your online accounts through your home computer, as it is that you’ll do it on one of your mobile devices like your smartphone and tablet. In order to outsmart the […]

The Ins and Outs of Scams

One of our favorite movies is The Sting (starring Paul Newman as Gondorff, Robert Redford as Johnny Hooker and Robert Shaw as the bad guy, Doyle Lonnegan). In the movie, Hooker and Gondorff team up to get even with Lonnegan after his gang killed Hooker’s partner. They craft a complicated con game to get even […]

Out with the old, in with the new

December – the season of giving and getting. At some point, when you’re getting all that new stuff, you have to decide what to do with the old stuff. We remember when we moved house a couple of years ago and came across 3 computers collecting dust in the attic. ‘What should we do with […]

Desperately Seeking Mo and Watching You

Are security folks paranoid? Sure we are. But, as the saying goes, that doesn’t mean that they aren’t out to get us. It also doesn’t mean that we’re crazy or that we’re wrong. Over at welivesecurity there’s a good write-up of FBI hacker teams being able to watch us (you, too -not just us paranoid […]

The Year of the Fingerprint?

In its 10 Hot Consumer Trends 2014, Ericsson tells us that 52% of the 5,000 smartphone users polled ‘want to use their fingerprints instead of passwords.’ Firstly, is Ericsson tipping its hand on what it has in store for us with their 2014 line-up? We suspect that they might not be enthusiastic to disclose poll […]