Free Wi-Fi can be an alluring perk for workers on the road. Business travel tends to bring long hours, and anytime there’s downtime to check in with what’s going on in the world or the office or send out that long-overdue email is tempting....

Predator: Cullen TenEyk: Joint Special Operator, Global Shooter of Bad Guys and extremely professional predator of all enemies to the United States. Discussion: I agree with Joshua Keating’s comments in his September 2013 Slate Magazine article, “Why Shopping Malls are Attractive Targets for Terrorists.” Keating suggests that...

Do you have a cell phone or laptop? Do you use them in airports? Guess what, that's the worst place to use your personal electronic devices! Here's why: Because of the mass use of mobile devices within airports, communication companies have installed "mini-towers" within airport terminals...

Predator: Cecilia A., Subject Matter Expert OSINT/Cybercrime's, Department of Defense, and US Government Agencies (especially those with 3-letters) Topic: How to Counter Data Collection Objectives Identify how privacy is compromised within the cyberspace. Identify how to prevent third parties from collecting personal data. Reduce online vulnerabilities through...

It’s probably easy for you to identify people who could gain physical access to your computer, tablets, phones, and other digital devices. It could be family members, roommates, co-workers, members of a cleaning crew, and others. But identifying the people who could gain remote access to...

Escape the Wolf THREAT™ reports are the standard. Research ahead, be the Sheepdog! Technical Threats ATM machine scams continue to increase and spread throughout Europe. Different techniques are used to collect your ATM card information and PIN number. In ATM Skimming, a credit card cloning device is put...