Profile cover photo
Profile photo
Alpha Group Investigations
4 followers
4 followers
About
Posts

Post has attachment
We’re all guilty of fluffing up a resume to get a little edge above the competition, or at least a foot in the door. But when it comes to hiring a caregiver for your children, trusting credentials on a piece of paper, just doesn’t cut it. When hiring a…
Add a comment...

Post has attachment
Before you start your holiday shopping, beware of the many tricks and scams that are currently out there, phishing information from online shoppers. Most recently, a legitimate looking email has been circulating to both  Amazon Prime and non-Prime members…
Add a comment...

Post has attachment
A recent flaw has been discovered that could allow cyber criminals to view and steal your information through Wi-Fi Protected Access 2 or more commonly referred to as WPA2. In layman’s terms, if you have a wireless device, a cybercriminal can trick you…
Add a comment...

Post has attachment
There is no age too young for parents, teachers and all other guardians of children to begin communicating with our youth, regarding the dangers of online communication. If a child knows how to use a Smartphone, computer or game console, they could become…
Add a comment...

Post has attachment
Smart Home technology is a growing trend throughout various consumer markets. Homeowners are making the transition to “Smart Living,” installing the latest smart fridge, washer & dryer, garage opener, thermostat, even light bulbs and automatic floor…
Add a comment...

Post has attachment
The Equifax breach has affected some 143 million American consumers as well as many individuals from the UK and Canada. Hackers infiltrated the Equifax system from mid-May through July of this year. The breach resulted in the theft of hundreds of millions…
Add a comment...

Post has attachment
This recently launched app has quickly become one of the most popular applications to download on the iOS App Store and Google Play. Within no time, Sarahah’s popularity spread among teens in both the UK and US markets, quickly ranking among the top three…
Add a comment...

Post has attachment
On Tuesday, researchers uncovered major Bluetooth vulnerabilities that could threaten billions of devices  using the short-range wireless protocol. The vulnerabilities could affect a myriad of smart devices ranging from Android or Apple smartphones to…
Add a comment...

Post has attachment
How to avoid falling victim to Malvertising and other cyber scams when shopping for mobile devices and personal computers for your kids before heading back to school. Labor Day is right around the corner, which means it’s time to get the kids ready for…
Add a comment...

Post has attachment
Recent studies have proven that the Amazon Echo could be used to spy on its users by taking advantage of features. In a recent study by Mike Barnes, a researcher at MWR Infosecurity, proved that the Amazon Echo could used essentially as a Wiretap, without…
Add a comment...
Wait while more posts are being loaded