To those of us consider Tom Cruise the movie star of our day or even Grunge as the music we grew up with, looking at millennials, and the way they view life, is fascinating. These “kids” or young adults, many are brilliant. They really do define “disruption”.
However, ... Views:25
If you are like most people, when you think of burglars, you think that it “won’t happen to me.” But, it very well could happen to you, because it happens each and every day across the country. I have taken some time to gather some recent real-life stories that will not only ... Views:36
The internet is a beautiful place. It is the way we communicate, the way we create, and the biggest business platform that has ever been generated. However, it is also a hazard, as anyone can put anything on it, and it’s extremely difficult to tell fact from fiction…especially if ... Views:28
In June, 2015, it was revealed by an anonymous source that the Office of Personnel Management was hacked. This office, which administers civil service, is believed to have been the target of the Chinese government. This is one of the largest hacks in history involving a federal ... Views:27
If you employ remote workers, your IT staff has a unique challenge keeping your organization safe. Fortunately, using a combination of best practices for cybersecurity, user awareness campaigns, and a strong policy will help to keep data safe.
New advances in mobile technology and networking ... Views:54
There are a number of misconceptions about cybercrime and those who engage in it. To a cybercriminal, there is no target that is special unless they have a grudge or beef with a particular entity, and as a rule, they will often cast their net wide and then move to attack the easiest prey they ... Views:43
Back in August, 2016, Kala Brown and Charles Carver arrived to a 100-acre property in South Carolina for a cleaning job. Charles Carver never made it off the property, and Kala Brown spent more than two months in a metal shipping container, allegedly held captive by Todd Christopher ... Views:71
According to a new study, genetics and evolution have made an impact on the murderous behavior of the human species. However, becoming civilized has tamed some of these instincts.
Scientists have looked at the homicide rate of more than 1,000 species that kill their own, and noticed that ... Views:50
In late 2016, a huge data breach occurred. More than 412 million accounts were affected when hackers got into FriendFinder Networks.
According to sources, approximately a million of those accounts had the password ‘123456,’ and approximately 100,000 has the password that was ... Views:44
It doesn’t matter who you are or where you live, your home is at risk of being burglarized. According to numerous studies, in the US alone, a burglary occurs about once every 18 seconds, which equates to about 5,000 a day.
Fortunately, you can secure your home or business against ... Views:58
A Massachusetts man is on trial. His crime? Stalking. But, it’s probably not what you think. The 48-year-old was chatting and sharing photos with a 16-year-old girl, and these chats and photos were “sexual in nature.” The pair met on social media, and when the girl asked to ... Views:62
This post isn’t exactly a “how to” but if your current employment isn’t bringing in the bacon, I’m sure your criminal mind can figure it out. In the biggest digital advertising fraud in the history of the U.S., it was recently found that a group of hackers is ... Views:78
It can be truly terrifying to fall through ice on a frozen lake, but if you remain calm, it can save your life. Most people don’t realize that you have more time than you think, according to experts. This is due to the concept of thermoregulation and how your body deals with the shocking ... Views:82
Burglars love doors, because that’s their No. 1 way of gaining entry to a house. When thinking of ways to make your home safer, you should really home in on your doors.
Solid wood door without a window (ideally with solid wood core)
Top flight deadbolt (ideally two)
Reinforced frame ... Views:79
According to a recent study, online security for most people is too bothersome. The US National Institute of Standards and Technology published the study, which shows that most people who use the internet have just given up and don’t follow the advice given to them about online ... Views:69
If you have a cell phone, and you use it in any way associated with accessing online accounts (and many do), you are putting yourself at risk of getting hacked. With only a phone number and a bit of information, which is easy to get through social engineering, a hacker can break into your ... Views:112
Teenagers across the country are falling into drug dealing, theft, and prostitution in order to eat. This, according to a recent study, which found that poverty has been increasing throughout the U.S.
Researchers at the Urban Institute in Washington, D.C. have taken a close look at the ... Views:56
Fake news is a problem that is taking the internet by storm, and it ran rampant during the 2016 Presidential Election. In fact, many believe that fake news stories had a strong impact on the outcome of the election. In a survey following the election by the Pew Research Center, a whopping 64 ... Views:109
Think about hackers breaking into accounts. If you think they need top-notch computer skills, you would be wrong. These days, instead of requiring skills behind a keyboard, hackers generally rely on strategy…specifically a strategy called social engineering. This means that hackers ... Views:100
Small businesses are hardly immune to attacks by hackers.
The illusion of low attack risks comes from the publicity that only huge corporations get when they are breached, like Target, Sony and Anthem. These are giants, so of course it makes headline news.
But when a “ma and pa” ... Views:109
Leave personal details off your Facebook page.
Does the whole world—or even your private circle, many of whom you haven’t seen in person for years, or even at all—have to know you’re laid up from hernia surgery (i.e., vulnerable, defenseless)?
Try this experiment for ... Views:100
Recently, says a report at wired.com, it’s been unveiled that the obscure Israel-based NSO Group has been selling spyware delivered to smartphones through vulnerabilities in Apple’s iOS operating system.
“Pegasus” spyware can put a surveillance out on nearly everything ... Views:109
You shouldn’t leave any digital trace of yourself after you leave a job. Hopefully, you’ll be leaving voluntarily and thus have the time to first make backups before you delete anything. This may seem easy, but you need to take inventory to make sure you get EVERYTHING.
Note: make ... Views:94
#1. Keep everything up to date. You know those annoying popups telling you updates are available? Do you ever click out of them? Don’t. Always update at the time these appear.
#2. Two-step verification. Two-step verification or authentication should be set up for all your accounts that ... Views:118
Who needs a hanger to steal a car when you can use a laptop? Despite today’s vehicles having far more sophisticated security protection, thieves can still break in—like the two crooks who stole at least 30 Dodge and Jeep vehicles…with just a laptop computer.
In Houston, ... Views:104
As long as humans sit at computer screens, there will always be infected computers. There’s just no end to people being duped into clicking links that download viruses.
A report at theregister.co.uk explains how subjects, unaware they were guinea pigs, fell for a phishing ... Views:103
If the super big wigs could get their social media accounts hacked, you can too. If you can believe it, the Twitter accounts of the following were recently hacked:
Google CEO Sundar Pichai
Yahoo CEO Marissa Mayer
Oculus CEO Brendan Iribe
Twitter co-founder Jack Dorsey
Shouldn’t ... Views:111
If you were to design the ultimate security system for a house, what would you focus on? These days, many people would immediately think in terms of the most technologically advanced alarm system—one that’s voice activated, detects motion anywhere, can be remotely controlled and ... Views:106
Trick e-mail = fraudulent wire transfer = hundreds of thousands to millions of dollars stolen.
That’s what’s happening with business executives in select industries (e.g., chemical operations, manufacturing), says a report at threatpost.com, citing a finding from Dell ... Views:96
One reason to go wireless is obvious: Who wants all sorts of wires built under their house, which requires more than just the abilities of a recreational DIY enthusiast, like the old fashioned home security systems required? Not only is this a hairy, time consuming installation project, but a ... Views:118
Lesson learned: If you run a fast-food restaurant or any company for that matter, you’d better treat your employees right. After all, they have a legal right to tweet all they want about you.
A Chipotle Mexican Grill in Havertown, PA, had a ban in place: Employees are prohibited from ... Views:126
Pokémon Go has taken the world by storm, even though it is nothing more than a silly little game that people play on their mobile device. And it is not just child’s play, either. Plenty of adults are hooked on Pokémon Go—including college degreed professionals who ... Views:148
Handwriting analysts really have their work cut out from them now, thanks to the development of new software that can forge—better than a human can—a person’s handwriting. So if you are worried about identity theft, add one more element to the kettle: a crook getting ahold of ... Views:114
One bitcoin = $590.
If you’re sucked into a ransomware scam, you’ll likely be charged at least one bitcoin for the cyber key to unlock your computer’s files—that are being held hostage by hackers.
A report from Check Point Software Technologies and IntSights has ... Views:129
Over the past two years, the media has tended to sensationalize jihadists’ rapid adoption and strategic use of social media. Despite perpetual news coverage on the issue, the public, by and large, continues to be relatively in the dark about the intricate ways in which many jihadists ... Views:104
Imagine you learn your husband (or wife) of 25 years is really a different person. That’s what happened to Mary Hickman—25 years after she married a man who had identified himself all those years back as Terry Jude Symansky. The Florida couple had a son and lead an uneventful life, ... Views:104
Sooner or later, you’ll need to leave your child home—unsupervised, alone—for an extended period. And even though you may have smart devices to keep a constant check on your child, this doesn’t mean you can instantly teleport home in the event your smart security system ... Views:125
The October anniversary of the liability shift has passed, and anniversaries are an excellent time to look back on progress…this is no exception. The U.S. EMV migration plan was set four years ago as a way to fight card fraud and to protect both consumers and merchants.
Back in the ... Views:114
If you’re planning a lengthy road trip, there are many things you’d never think to bring with you that could get you out of a crisis situation. You need way more than just that blanket in the trunk, car jack and spare tire, umbrella, rainproof poncho, utility tool and fire ... Views:132
Whether you’re driving long distance to make a career move, visit family/friends, or just sightsee multiple states, you may be wondering what kind of helpful applications for your phone are out there.
There’s just tons, and many fall under the category of convenience, such as apps ... Views:123
Rule #1 for women traveling alone: Do not look or act like prey, as this will grab the attention of any predator nearby. Looking like non-prey may be difficult for some women, but one way is to dress in black. Black is the color of authority (e.g., judges, nuns, priests, referees, police ... Views:121
“I had my earphones in and didn’t know he was there until he threw me to the ground,” says Taela Davis, 25, of Australia in a heraldsun.com article.
Big Mistake: Wearing earbuds while walking about in public. Even if you’re a big bruiser MMA fighter, you should not ... Views:118
Whoever said that fighting back at a rapist will probably create more problems for the victim might want to rethink this idea. How disabling can a bite to the rapist’s neck be when the biter is a human?
I mean, we’re not talking about a dog biting the man. When it comes to biting, ... Views:108
If you’re ever confronted by an assailant in your garage, you may have any number of highly effective weapons within your reach. A woman in Indianapolis identified as Carol found that out soon enough when she arrived home in February of 2016.
A man was waiting in her garage. The ... Views:119
Jeannette Tamayo was nine when she was abducted in June 2003, and exhibited a presence of mind that few adults would have in a similar circumstance.
Home from school, Jeannette entered her house, unaware that a man had been following her; he entered too, and that’s when the nightmare ... Views:147
Roy Chattelle was on a road trip in 2008 and suffered what seemed like a minor tire leak. So he got the tire repaired. Many people think nothing of pulling into the nearest tire shop and getting that little puncture or tear repaired or “plugged.”
A few months after this routine ... Views:129
Don’t let the idea of reinforcing your house’s doors intimidate you. Here is step by step instruction on installing new stronger locks.
Your House’s Door Parts Inventory
Any door without a deadbolt gets a deadbolt, which should be a grade 1 or 2.
Are the screws of any ... Views:107
What’s sicker than raping a woman? Ordering her to phone her boyfriend so he could listen to the rape. But that was a good thing for a woman who was kidnapped last year. Her abductor drove her to the parking lot of an adult entertainment store in Georgia with the intent of raping her, ... Views:119
The iPhone has a vulnerability called the Signaling System 7 (SS7) that allows crooks to hack into the device.
This was demonstrated on a recent “60 Minutes” episode in which a U.S. congressman (with his permission) had his iPhone hacked by German cybersecurity experts. The ... Views:137
A crook can steal your identity by taking control of your wireless phone account—by pretending to be you in person at the mobile store. The villain can then buy pricey mobiles and sell them—and guess who gets the bill but not the profit.
Symptoms of Hijacked Account
Suddenly ... Views:141