Author: Ben Dickson / Source: The Daily Dot
Source: Information Security Buzz
Author: Hope Reese / Source: TechRepublic