Elemental Holdings, Inc. A South Florida Graphic Design Firm
  • ENGAGE
  • CULTURE
  • CASE STUDIES
  • SOLUTIONS
  • COMMUNICATE
  • DISCOVER
  • Menu Menu

WHY YOU SHOULD CARE ABOUT ONLINE PRIVACY

2018/07/11/0 Comments/in Frontpage Article, Internet News, Privacy, Security/by Bruce Quiroz

JACKIE DANA – Namecheap

Data breaches and violations of our privacy seem to be a daily occurrence.

From Edward Snowden’s bombshell that the American government tracks its citizens to Cambridge Analytica collecting Facebook data from millions of people to allegedly influence the 2016 US presidential election, it’s clear that a lot of our personal information is out there. And it’s not always being used in the most transparent, ethical, or even legal ways.

It seems as if every aspect of our private lives can be dissected and scrutinized by corporate and government interests—or by other parties that mean to do us harm.

It’s a difficult topic, but awareness is the first step in protecting yourself. So with that in mind, let’s take a closer look at some of the ways others access our personal data and examine ways in which you can protect your privacy.

Hackers Want Your Personal Data

The most obvious issue that comes to mind when thinking about privacy violations is hacking and other criminal activity. There are people out there who will stop at nothing to try to grab your information and break into your private accounts. Here are a few ways they do it.

  • Data breaches. The Equifax breach that may have leaked millions of people’s data, including Social Security numbers, was just one of many examples where hackers gained access to a vast database of information that could be used for identity theft. These things happen more often than most of us realize, so it’s important to remain vigilant and regularly update your passwords.
  • Webcams. Do you cover the webcam on your computer when you’re not using it? Maybe you should. The camera on your laptop or computer monitor can be hacked to give strangers access to what’s going on inside your house.
  • Web browsing and email. When you’re on the Internet, it’s way too easy for other people to get information about you. Beyond social media and shopping behavior, just surfing the web and checking your email can get you into trouble. Innocent-looking emails might send you to fraudulent banking or other websites that try to capture your login details, a process called phishing. Other websites might track your online behavior by placing nefarious cookies in your browser that send your data places you might not want it to be.
  • Social Engineering. Often it’s just small bits of data that hackers are after. Your date of birth, along with your email or mailing address (perhaps listed on your website or Whois information on your domain) could provide a key that a criminal can use to reset your account passwords or gain access to important accounts. For example, back in 2012, hackers compromised Wired staff writer Mat Honan’s digital accounts and deleted all of his computer files just by having critical bits of information about him.

These are just a few ways hackers can disrupt your life. Security experts warn that with more of us connecting additional devices to the Internet (things like our thermostats, digital assistants like the Amazon Echo or Google Home, and home security systems) that’s just exposing even more of our lives to potential hacking.

It’s More than Just Hacking

Beyond the illegal activities, there are dozens of ways people gain legitimate access to your data on a daily basis, often with your explicit consent. It’s worth considering how often your activities are being monitored and what kinds of information you willingly provide to corporations and the government. Here are just a handful of examples to consider:

dna strand

  • DNA records. In the past few years, companies like 23andMe and Ancestry.com have started offering genetic mapping and profiling services: you simply mail in a cheek swab and, in return, the company sends you the results and stores your DNA records in their databases. But have you ever considered how this data might be used in the future? As we recently saw with the apprehension of the Golden State Killer in California using a genetic database at the genealogy service Ysearch.org, you never know how your DNA records might be used. Today it might be solving a murder, but in the future, who knows? Your genetic profile could be used to determine health coverage or other purposes you didn’t expect.
  • Ride sharing. Go ahead and call a Lyft or Uber. You’ll give that company data on where you live, who else lives there, and your entertainment habits. Uber even got caught tracking their customersafter they dropped them off.
  • Pokémon Go and other mobile games. It’s just a game, right? By using GPS data to provide location-based entertainment, this addictive mobile app also keeps a close eye on where you–or your kids–are throughout the day.
  • Amazon and other retail apps. If you’re like many people, you turn to Amazon for much of your online purchases and household services. You might use the Starbucks or Target apps on your phone to order in advance or get discounts. And each time you buy online from major retailers or use their apps, you’re giving them rich data for future use.
  • Cell phones. This may be a no-brainer, but every mobile device has a GPS chip that locates the phone even when it’s turned off. This allows emergency services to locate you when you need help—but the question is, who else has access to that data?
  • Video surveillance/closed-circuit television (CCTV). From ATMs to ‘eye in the sky’ cameras at department stores, cameras are always watching you when you’re out on public streets. Red light cameras and cameras on toll roads snap your car’s license plate to send you violation notices or fee invoices. Any time you leave your home in most urban centers in the US and Europe (and in major cities across the world), someone knows what you’re doing.

This is a long list of ways companies can compromise your privacy, all in the name of day-to-day business. When you think about it, it’s almost enough to make you want to throw your hands up and surrender, right?

Don’t despair! While some things are out of your control, there are still things you can do to protect your information.

Simple Steps to Protect Your Privacy Online

Let’s face it: if you’re online, a lot of your information is out there.

You might not care if companies know your purchase history or where you go on the weekends. And you might not worry about the government tracking you because you think you have nothing to hide. What’s more, there are benefits to sharing our data to take advantage of everything our modern society enables us to do. It’s nice to be able to use Google Maps to find a new restaurant or chat with your friends on Facebook.

So unless you pursue an off-the-grid lifestyle out in the country, modern convenience requires surrendering a certain amount of your privacy.

password graphic

That being said, there are some ways you can minimize the impact of potential privacy violations and prevent people from gaining access to information that can compromise your safety and well-being.

  • Provide the bare minimum. Many times companies will ask for personal information that they don’t need. Challenge anyone who asks for your Social Security number or email address. Don’t put your address on your resume or job search websites, and if you have a home business, consider getting a P. O. Box to avoid giving out your personal address.
  • Protect your email address. Everyone wants your email, which can be flattering depending on who’s asking for it. But it can also be a ticket to spam as well as a possible gateway for phishing or hackers to access your account. If you find yourself giving out your email often, consider creating a disposable email address using a free Gmail or Yahoo account. Then, whenever you enter a sweepstakes or join a mailing list, enter that address rather than your personal one. You can still receive messages at that address if you want by forwarding it to your real address and filtering it into a separate folder.
  • Avoid giving your information to unknown parties. Don’t play games on Facebook that require you to connect your profile. Use privacy settings to lock down your social media profiles so only your friends can see what you’re posting.
  • Cover your webcam. You can use a post-it note, masking tape, or removable sticker. Also, consider disabling the front-facing camera on your mobile devices. For more ideas, check out this Mashable article.
  • Regularly check your credit reports. In the US, you can order a report for free once a year through each credit reporting agency or by going to AnnualCreditReport.com.
  • Be smart with passwords. Don’t use the same password for different websites, and change your most important passwords regularly. If a site gets hacked, don’t hand the hacker the keys to all of your other accounts. And never give out a password to anyone over the phone or email. Customer support professionals have secure ways of accessing your account (if necessary) without having to ask for your password.
  • Beware of public Wi-Fi. As we described in a previous article, it’s far too easy for hackers to gain access to your login data. If you frequently use the Wi-Fi in coffee shops or restaurants, consider investing in an inexpensive VPN solution.
  • Enable two-factor authentication (2FA) everywhere. Many major websites—including blogging platforms, banks, and even online games—offer 2FA protection, which is a second step of authentication that’s difficult for a hacker to replicate. Often, 2FA will require you to enter a code texted to your mobile device or sent via a third-party app.
  • Use a passcode on your cell phone. Sure, it’s annoying to always have to enter your passcode, but passcode protection keeps people from gaining access to your personal data, contacts, social media accounts, and email if you get separated from your device even for a few minutes.

This list is just the tip of the iceberg, but it’s a great way to get started. For an even longer list of steps you might take to protect yourself, check out the 66 privacy tips from Consumer Reports.

Protect Your Personal Data

At Namecheap, we value your privacy. We don’t sell your personal information to other companies, and here on the blog, we work to keep you aware of different ways your privacy might be violated.

We also believe that we should do our part to keep your personal contact information out of the hands of hackers, spammers, and Internet marketers.

That’s why we now provide WhoisGuard free for all of our eligible domains—for life! If you register your domains with us, you can rest easy knowing that you’ve taken one vital step to keeping your personal information safe.

https://elementalstudios.us/wp-content/uploads/2018/07/blog02_blog-post.png 576 801 Bruce Quiroz https://elementalstudios.us/wp-content/uploads/2016/09/logo_es_nav-1.png Bruce Quiroz2018-07-11 15:47:222018-07-11 15:47:22WHY YOU SHOULD CARE ABOUT ONLINE PRIVACY

9 Facts About Computer Security That Experts Wish You Knew

2015/03/05/0 Comments/in Frontpage Article, News, Privacy/by Bruce Quiroz

Article Provided By: Annalee Newitz via Gizmodo

Every day, you hear about security flaws, viruses, and evil hacker gangs that could leave you destitute — or, worse, bring your country to its knees. But what’s the truth about these digital dangers? We asked computer security experts to separate the myths from the facts. Here’s what they said.

1. Having a strong password actually can prevent most attacks

Yahoo’s Chief Information Security Officer Alex Stamos has spent most of his career finding security vulnerabilities and figuring out how attackers might try to exploit software flaws. He’s seen everything from the most devious hacks to the simplest social engineering scams. And in all that time, he’s found that there are two simple solutions for the vast majority of users: strong passwords and two-factor authentication.

Stamos says that the biggest problem is that the media focuses on stories about the deepest and most complicated hacks, leaving users feeling like there’s nothing they can do to defend themselves. But that’s just not true. He told me via email:

I’ve noticed a lot of nihilism in the media, security industry and general public since the Snowden docs came out. This generally expresses itself as people throwing up their hands and saying “there is nothing we can do to be safe”. While it’s true that there is little most people can do when facing a top-tier intelligence apparatus with the ability to rewrite hard drive firmware, this should not dissuade users from doing what they can to protect themselves from more likely threats and security professionals from building usable protections for realistic adversaries.

Users can protect themselves against the most likely and pernicious threat actors by taking two simple steps:

1) Installing a password manager and using it to create unique passwords for every service they use.

2) Activating second-factor authentication options (usually via text messages) on their email and social networking accounts.

The latter is especially important since attackers love to take over the email and social accounts of millions of people and then automatically use them to pivot to other accounts or to gather data on which accounts belong to high-value targets.

So I would really like the media to stop spreading the idea that just because incredible feats are possible on the high-end of the threat spectrum, doesn’t mean it isn’t possible to keep yourself safe in the vast majority of scenarios.

Adam J. O’Donnell, a Principal Engineer with Cisco’s Advanced Malware Protection group, amplified Stamos’ basic advice:

Oh, and my advice for the average person: Make good backups and test them. Use a password vault and a different password on every website.

Yep, having a good password is easy — and it’s still the best thing you can do.

2. Just because a device is new does not mean it’s safe

When you unwrap the box on your new phone, tablet or laptop, it smells like fresh plastic and the batteries work like a dream. But that doesn’t mean your computer isn’t already infected with malware and riddled with security vulnerabilities.

I heard this from many of the security experts I interviewed. Eleanor Saitta is the technical director for the International Modern Media Institute, and has worked for over a decade advising governments and corporations about computer security issues. She believes that one of the most pernicious myths about security is that devices begin their lives completely safe, but become less secure as time goes on. That’s simply not true, especially when so many devices come with vulnerable adware like Superfish pre-installed on them (if you recall, Superfish came pre-installed on many Lenovo laptop models):

That’s why the Superfish thing was such a big deal. They built a backdoor in, and they built a really bad, incompetent one, and now it turns out that anybody can walk through.

When you’re relying on code delivered by somebody else, a service online or box that you don’t control, chances are good that it’s not acting in your interest, because it’s trying to sell you. There’s a good chance that it’s already owned or compromised by other people. We don’t have a good way of dealing with trust and managing it right now. And all sorts of people will be using that code.

The other issue, which erupted in the media over the past day with the FREAK attack, is that many machines come pre-installed with backdoors. These are baked in by government request, to make it easier for law enforcement and intelligence agencies to track adversaries. But unfortunately, backdoors are also security vulnerabilities that anyone can take advantage of. Says Saitta:

I think one thing that is really important to understand is that if you built a monitoring system into a network like a cell network, or into a crypto system, anybody can get in there. You’ve built a vulnerability into the system, and sure, you can control access a little. But at the end of the day, a backdoor is a backdoor, and anybody can walk through it.

3. Even the very best software has security vulnerabilities

Many of us imagine that sufficiently good software and networks can be completely safe. Because of this attitude, many users get angry when the machines or services they use turn out to be vulnerable to attack. After all, if we can design a safe car, why not a safe phone? Isn’t it just a matter of getting the tech and science right?

But Parisa Tabriz told me via email that you can’t look at information security that way. Tabriz is the engineer who heads Google’s Chrome security team, and she believes that information security is more like medicine — a bit of art and science — rather than pure science. That’s because our technology was built by humans, and is being exploited by humans with very unscientific motivations. She writes:

I think information security is a lot like medicine — it’s both an art and science. Maybe this is because humans have explicitly built technology and the internet. We assume we should be able to built them perfectly, but the complexity of what we’ve built and now hope to secure almost seems impossible. Securing it would require us to have zero bugs, and that means that the economics are not on the side of the defenders. The defenders have to make sure there are zero bugs in all software they use or write (typically many millions of lines of code if you consider the operating system too), whereas the attacker only has to find one bug.

There will always be bugs in software. Some subset of those bugs will have security impact. The challenge is figuring out which ones to spend resources on fixing, and a lot of that is based on presumed threat models that probably would benefit from more insight into people’s motivations, like crime, monitoring, etc.

RAND Corporation computer security researcher Lillian Ablon emailed me to say that there is simply no such thing as a completely secure system. The goal for defenders is to make attacks expensive, rather than impossible:

With enough resources, there is always a way for an attacker to get in. You may be familiar with the phrase “it’s a matter of when, not if,” in relation to a company getting hacked/breached. Instead, the goal of computer security is to make it expensive for the attackers (in money, time, resources, research, etc.).

4. Every website and app should use HTTPS

You’ve heard every rumor there is to hear about HTTPS. It’s slow. It’s only for websites that need to be ultra-secure. It doesn’t really work. All wrong. The Electronic Frontier Foundation’s Peter Eckersley is a technologist who has been researching the use of HTTPS for several years, and working on the EFF’s HTTPS Everywhere project. He says that there’s a dangerous misconception that many websites and apps don’t need HTTPS. He emailed to expand on that:

Another serious misconception is website operators, such as newspapers or advertising networks, thinking “because we don’t process credit card payments, our site doesn’t need to be HTTPS, or our app doesn’t need to use HTTPS”. All sites on the Web need to be HTTPS, because without HTTPS it’s easy for hackers, eavesdroppers, or government surveillance programs to see exactly what people are reading on your site; what data your app is processing; or even to modify or alter that data in malicious ways.

Eckersley has no corporate affiliations (EFF is a nonprofit), and thus no potential conflict of interest when it comes to promoting HTTPS. He’s just interested in user safety.

5. The cloud is not safe — it just creates new security problems

Everything is cloud these days. You keep your email there, along with your photos, your IMs, your medical records, your bank documents, and even your sex life. And it’s actually safer there than you might think. But it creates new security problems you might not have thought about. Security engineer Leigh Honeywell works for a large cloud computing company, and emailed me to explain how the cloud really works. She suggests that you begin thinking about it using a familiar physical metaphor:

Your house is your house, and you know exactly what the security precautions you’ve taken against intruders are – and what the tradeoffs are. Do you have a deadbolt? An alarm system? Are there bars on the windows, or did you decide against those because they would interfere with your decor?

Or do you live in an apartment building where some of those things are managed for you? Maybe there’s a front desk security person, or a key-card access per floor. I once lived in a building where you had to use your card to access individual floors on the elevator! It was pretty annoying, but it was definitely more secure. The security guard will get to know the movement patterns of the residents, will potentially (though not always, of course!) recognize intruders. They have more data than any individual homeowner.

Putting your data in the cloud is sort of like living in that secure apartment building. Except weirder. Honeywell continued:

Cloud services are able to correlate data across their customers, not just look at the ways an individual is being targeted. You may not [control access to the place where] your data is being stored, but there’s someone at the front desk of that building 24/7, and they’re watching the logs and usage patterns as well. It’s a bit like herd immunity. A lot of stuff jumps out at [a defender] immediately: here’s a single IP address logging into a bunch of different accounts, in a completely different country than any of those accounts have been logged into from ever before. Oh, and each of those accounts received a particular file yesterday — maybe that file was malicious, and all of those accounts just got broken into?

But if it’s a more targeted attack, the signs will be more subtle. When you’re trying to defend a cloud system, you’re looking for needles in haystacks, because you just have so much data to handle. There’s lots of hype about “big data” and machine learning right now, but we’re just starting to scratch the surface of finding attackers’ subtle footprints. A skilled attacker will know how to move quietly and not set off the pattern detection systems you put in place.

In other words, some automated attack methods become blatantly obvious in a cloud system. But it also becomes easier to hide. Honeywell says that users need to consider the threats they’re seriously worried about when choosing between a cloud service and a home server:

Cloud services are much more complex systems than, say, a hard drive plugged into your computer, or an email server running in your closet. There are more places that things can go wrong, more moving parts. But there are more people maintaining them too. The question folks should ask themselves is: would I be doing a better job running this myself, or letting someone with more time, money, and expertise do it? Who do you think of when you think about being hacked — is it the NSA, random gamer assholes, an abusive ex-partner? I ran my own email server for many years, and eventually switched to a hosted service. I know folks who work on Gmail and Outlook.com and they do a vastly better job at running email servers than I ever did. There’s also the time tradeoff — running an email server is miserable work! But for some people it’s worth it, though, because NSA surveillance really is something they have worry about.

6. Software updates are crucial for your protection

There are few things more annoying in life than the little pop-up that reminds you that updates are required. Often you have to plug your device in, and the updates can take a really long time. But they are often the only thing that stands between you and being owned up by a bad guy. Cisco’s O’Donnell said:

Those software update messages are [not] there just to annoy you: The frequency of software updates is driven less by new software features and more because of some very obscure software flaw that an attacker can exploit to gain control of your system. These software patches fix issues that were publicly identified and likely used in attacks in the wild. You wouldn’t go for days without cleaning and bandaging a festering wound on your arm, would you? Don’t do that to your computer.

7. Hackers are not criminals

Despite decades of evidence to the contrary, most people think of hackers as the evil adversaries who want nothing more than to steal their digital goods. But hackers can wear white hats as well as black ones — and the white hats break into systems in order to get there before the bad guys do. Once the vulnerabilities have been identified by hackers, they can be patched. Google Chrome’s Tabriz says simply:

Also, hackers are not criminals. Just because someone knows how to break something, doesn’t mean they will use that knowledge to hurt people. A lot of hackers make things more secure.

O’Donnell emphasizes that we need hackers because software alone can’t protect you. Yes, antivirus programs are a good start. But in the end you need security experts like hackers to defend against adversaries who are, after all, human beings:

Security is less about building walls and more about enabling security guards. Defensive tools alone can’t stop a dedicated, well resourced attacker. If someone wants in bad enough, they will buy every security tool the target may have and test their attacks against their simulated version of the target’s network. Combatting this requires not just good tools but good people who know how to use the tools.

RAND’s Ablon adds that malicious hackers are rarely the threat they are cracked up to be. Instead, the threat may come from people you don’t suspect — and their motivations may be far more complicated than mere theft:

A lot of the time an internal employee or insider is just as big of a threat, and could bring a business to its knees – intentionally or inadvertently. Furthermore, there are distinct types of external cyber threat actors (cybercriminals, state-sponsored, hacktivists) with different motivations and capabilities. For example, the cybercriminals who hacked into Target and Anthem had very different motivations, capabilities, etc. than those of the state-sponsored actors who hacked into Sony Pictures Entertainment.

8. Cyberattacks and cyberterrorism are exceedingly rare

As many of the experts I talked to said, your biggest threat is somebody breaking into your accounts because you have a crappy password. But that doesn’t stop people from freaking out with fear over “cyberattacks” that are deadly. Ablon says that these kinds of attacks are incredibly unlikely:

Yes, there are ways to hack into a vehicle from anywhere in the world; yes, life-critical medical devices like pacemakers and insulin pumps often have IP addresses or are enabled with Bluetooth – but often these types of attacks require close access, and exploits that are fairly sophisticated requiring time to develop and implement. That said, we shouldn’t be ignoring the millions of connected devices (Internet of Things) that increase our attack surface.

Basically, many people fear cyberattacks for the same reason they fear serial killers. They are the scariest possible threat. But they are also the least likely.

As for cyberterrorism, Ablon writes simply, “Cyberterrorism (to date) does not exist … what is attributed to cyberterrorism today, is more akin to hacktivism, e.g., gaining access to CENTCOM’s Twitter feed and posting ISIS propaganda.”

9. Darknet and Deepweb are not the same thing

Ablon writes that one of the main problems she has with media coverage of cybercrime is the misuse of the terms “Darknet” and “Deepweb.”

She explains what the terms really mean:

The Deepweb refers to part of the Internet, specifically the world wide web (so anything that starts www) that isn’t indexed by search engines, so can’t be accessed by Google. The Darknet refers to non-“www” networks, where users may need separate software to access them. For example, Silk Road and many illicit markets are hosted on [Darknet] networks like I2P and Tor.

So get a password vault, use two-factor auth, visit only sites that use HTTPS, and stop worrying about super intricate cyber attacks from the Darknet. And remember, hackers are here to protect you — most of the time, anyway.

https://elementalstudios.us/wp-content/uploads/2015/03/9Facts.jpg 270 636 Bruce Quiroz https://elementalstudios.us/wp-content/uploads/2016/09/logo_es_nav-1.png Bruce Quiroz2015-03-05 13:05:212015-03-05 13:05:219 Facts About Computer Security That Experts Wish You Knew

10 important URLs that every single Google user needs to know

2014/03/21/0 Comments/in Business, Frontpage Article, Internet News, News, Privacy/by Bruce Quiroz

Original Source: http://bgr.com/

Personally, I love that Google is so creative with my private data. I am fully aware that in order to use Google’s many great “free” services, I pay the company in information about myself that helps it serve better ads. That same information lets it create fantastic services such as Google Now, and it saves me a tremendous amount of pain and suffering. It also, of course, helps make Google Search better. But even if you’re like me and you’re happy with this model, it’s still very important to be fully aware of what Google collects and how you can control it.

With that in mind, here are 10 important URLs compiled recently by Digital Inspiration that every single Google user should be aware of.

https://accounts.google.com/SignUpWithoutGmail — Create a Google account with your current email address instead of making a new gmail.com address.

https://www.google.com/ads/preferences — View and edit your profile within Google’s system as it relates to advertising (you can also opt out of interest-based ads here).

https://www.google.com/takeout — Use this link to export all of your data contained within the Google ecosystem, including emails, photos and YouTube videos.

https://support.google.com/legal — This URL will let you file a complaint in the event you find your content being used without permission on a Google website.

https://maps.google.com/locationhistory — This is exactly what you think it is, your location history if you use an Android phone or the Google Now iOS app.

https://history.google.com — Your entire search history; make a pot of coffee before you start digging.

https://www.google.com/settings/account/inactive — If you have unused Gmail accounts, use this to ensure that Google doesn’t delete them after extended periods of inactivity.

https://security.google.com/settings/security/activity — Think someone might have gained unauthorized access to your account? This is your first stop.

https://security.google.com/settings/security/permissions — Here is a complete list of all Web, mobile and desktop apps that can access your data.

https://admin.google.com/YOURDOMAIN/VerifyAdminAccountPasswordReset — A link to reset your Google Apps password if your account is ever hacked (replace “YOURDOMAIN” with your URL, including the top-level domain).

https://elementalstudios.us/wp-content/uploads/2014/03/gmail-sign-google.jpg 352 625 Bruce Quiroz https://elementalstudios.us/wp-content/uploads/2016/09/logo_es_nav-1.png Bruce Quiroz2014-03-21 12:13:162014-04-29 11:41:3010 important URLs that every single Google user needs to know
Search Search

Recent Posts

  • Wordfence 7.8.0 Is Out! Here Is What Is Included
  • Patch Now: The WordPress 6.0.3 Security Update Contains Important Fixes
  • Wordfence 7.7
  • You Don’t Need to Be a Magician to Optimize SEO
  • Meta is building VR gloves for the metaverse

Categories

  • Apps
  • Business
  • Colors
  • E-Commerce
  • Frontpage Article
  • Graphic Design
  • Graphic Design Firm
  • Internet News
  • Internet Speed
  • Marketing
  • News
  • Printing
  • Privacy
  • Psychology
  • Security
  • SEO
  • Social Media
  • Technology
  • Typography
  • WordPress

Recent Comments

    Archives

    • November 2022
    • October 2022
    • January 2022
    • November 2021
    • October 2021
    • August 2021
    • April 2021
    • June 2020
    • May 2020
    • March 2020
    • February 2020
    • October 2019
    • September 2019
    • July 2019
    • May 2019
    • April 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • September 2018
    • July 2018
    • June 2018
    • May 2018
    • March 2018
    • October 2017
    • November 2016
    • October 2016
    • September 2016
    • August 2016
    • April 2016
    • March 2016
    • February 2016
    • January 2016
    • August 2015
    • June 2015
    • May 2015
    • April 2015
    • March 2015
    • November 2014
    • October 2014
    • July 2014
    • April 2014
    • March 2014
    • February 2014
    • December 2013
    © Copyright - Elemental Holdings, Inc. A South Florida Graphic Design Firm || "We Share your Dreams with the World" || Contact us today via phone or e-mail || info@elementalstudios.us || T. 954.586.4410
    • Link to Facebook
    • Link to Behance
    • Link to X
    • Link to Instagram
    • Link to Youtube
    • Link to Rss this site
    • Link to Mail
    • Link to 500px
    Scroll to top Scroll to top Scroll to top