We are currently looking for an Official SelfGrowth.com Guide to "Identity Theft". If you have expertise in Identity Theft and your own website and/or product for this topic, please reviewthis formfor complete details. The Official Guide Position is part of ourPremium Placement Package
We’re told to change our passwords often to minimize getting hacked. Now we’re told this is a bad thing.
But not for any inherent techy reason. It’s because frequent password changing makes many people lower their guard when it comes to creating new passwords.
They get lax ... Views:954
Gee, if your home is connected to lots of different devices, doesn’t it make sense that your cybersecurity integrates all your connected devices? Meet the Bitdefender BOX, a network bulletproofing hardware cybersecurity tool for the home that embraces smart home protection focusing on the ... Views:964
Bad news for users of the Xfinity home security system: It can report locked doors and windows that have been bypassed by an intruder and miss an intruder’s movements, says an article on wired.com.
The intruder circumvents the system by using a radio jammer to block the 2.4 GHz ... Views:920
Everyone has received very obvious “phishing” e-mails: Messages in your in-box that have outrageous subject lines like “Your Account Will Be Suspended,” or, “You Won!”
While some phishing attacks are obvious, others look harmless, such as those in a ... Views:663
Disasters happen every day. Crashing hard drives, failing storage devices and even burglaries could have a significant negative impact on your business, especially if that data is lost forever. You can avoid these problems by backing up your data.
Backing up means keeping copies of your ... Views:685
The computers in your household should have controls on them for security—even if you don’t have children living with you.
Chrome OS
On the Chrome browser in the upper right are three horizontal lines; click this symbol.
Click “Add supervised user.”
Enter the name ... Views:648
$200 million: The amount people were ripped off by online dating scams in a year.
DUI: dating while under the influence…of the quest for love…is costly to countless people.
A nytimes.com article notes that this quest impairs judgment, making it easy for con artists to bilk ... Views:676
Here’s one for the know-it-alls: Kids are 35 percent more likely to become victims of identity theft than are adults. Betcha didn’t know that! This startling news comes from a 2015 Javelin Strategy & Release study.
Needless to say, the bulk of parents aren’t on top ... Views:653
Some people believe that monitoring your kids’ online activities crosses the line of privacy or trust. But monitoring and controlling online activities is, essentially, no different than controlling access to the cookie jar or TV or even locking a liquor cabinet.
Which brings me to a ... Views:700
13.1 million people were stricken by identity theft last year in America, reports a study by Javelin Strategy & Research which reveals:
Many people who don’t trust their banks are unwittingly doing things that make crime easier for crooks. This includes not using the bank’s ... Views:663
Cyber criminals have been attempting to extort money from individuals and companies for many years, and the latest attempt to take advantage of others is by using Ransomware as a Service, or RaaS.
A ransomware virus infects a computer when a user clicks a link and unknowingly download a ... Views:654
I hate to say this, but…any dummy can learn to pick a lock. This means that the locks on your house’s doors are probably very “pickable” unless you have a top-flight lock system—which few homes actually have.
An article on lifehacker.com describes how easy it ... Views:745
Once a thief knows your Social Security number…you’re at very high risk for having your identity stolen.
A report on bankrate.com says that the IRS is warning of a cyber attack on its electronic filing PIN application. Thieves infiltrated it with malware in an attempt to claim ... Views:693
Identity thieves are after children’s Social Security numbers. With this number, a thief can do so many things like open a credit card account and rent an apartment. Kids’ SSNs have great appeal to crooks because:
A child’s record is usually very clean.
This means fertile ... Views:737
You may be putting your company at risk simply by hiring a new employee. Why? Because that person could have a hidden, malicious agenda.
This is known as an inside threat, and it means that someone within your organization is planning or conducting activities meant to harm the company.
There ... Views:651
If you’re using the app Strava for example, your bike could get stolen, says a report on the manchestereveningnews site. Strava, like many other location apps, isn’t the badguy here.
Bicyclists in Greater Manchester are being warned that Strava’s tracking could lead thieves ... Views:657
If you are concerned how long any negative information will remain on your credit report, it takes seven years from the Date of the Last Activity (DLA) before the item is deleted from your records (and seven to 10 years for bankruptcies). This is a very common question posed to credit ... Views:709
Do you shop at Amazon.com? Are you aware they have a back door through which hackers can slip in?
Let’s look at Eric’s experience with hackers and Amazon, as he recounts at medium.com/@espringe.
He received an e-mail from Amazon and contacted them to see what it was about. ... Views:843
Your account passwords should be as unique as your fingerprint—to make them less hackable by crooks using password-guessing software that can run through millions of possible combinations in just minutes. And if you have an easy password, there may be a hit within 10 seconds.
Think ... Views:654
Ever consider the possibility that a person gets a job as a bank teller…for the sole purpose of stealing a patron’s identity?
Do you realize how easy this would be?
No techy hacking skills required.
No gun required.
So we’ve all been instilled with fear of our bank ... Views:713
Companies have been struggling for years to keep cyber-attacks at bay. Cyberthieves are working faster than ever before to send out their malicious attacks, and it’s become increasingly difficult for companies to keep up.
CNN reports that almost one million malware strains are ... Views:732
Ever wonder how a water leak sensor actually works?
Water comes into contact with the sensor. The sensor makes and electrical contact and send a signal.
The sensor transmits a signal to a central station of sorts (kind of like how if extreme heat or a needle comes in contact with your ... Views:715
I love that show, “Forensic Files.” Every so often there’s the case of a person who was found murdered in their apartment due to some forced entry. Which brings me to the topic of apartment security.
New Apartment
Don’t delay in doing a walk-through of the entire ... Views:724
Imagine the effectiveness of the following sign at your front door when a would-be intruder reads it:
WARNING: This house is protected by a remote monitoring service; if you break in while the homeowner is away, he’ll be instantly alerted and the police will be automatically ... Views:596
Cybercriminals know that the best way to get their claws on the next victim is to appeal to their emotions, not logic.
There’s lots of scary things in life, and one is learning that your computer has been infected with a virus. If this happens, you’re now vulnerable to spending ... Views:620
Most people have heard of storing information in “the cloud,” but do you know what this means, and if it is even safe?
A cloud is basically a network of servers that offer different functions. Some of these servers allow you to store data while others provide various services. The ... Views:698
This week I worked with Gemalto, as part of Gemalto’s #ChipAwayAtFraud campaign. I was tasked with using my “chip” card when making a bunch of every day purchases like getting coffee and shopping. Gemalto, one of the world’s leaders in digital security, wanted a ... Views:694
If you want to get an idea of how safe or crime-ridden a town may be, do some casual observing including at night:
Are women walking or jogging alone at night?
Are people hanging out in the evening having a good time?
Are children mysteriously absent on a sunny weekend afternoon?
Are ... Views:699
Often, hucksters prey on the consumer’s desperation, which is why it’s no surprise that the No. 1 rip-off (at least between 2011 and 2012)) was bogus products promising weight loss.
VICE (vice.com) interviewed psychologist Maria Konnikova about how cyber cons are so ... Views:697
Scams targeting older people are probably very under-reported, as seniors don’t want to appear senile. The most vulnerable group is educated men over 55, because, quite frankly, they think they know everything.
Sweepstakes/Lottery
This scam comes in many forms, but the common ... Views:699
What are you doing to prevent tax identity theft? Do you even know what steps to take? You’d better, because this crime has tripled since 2010, says the FTC.
A report on foxbusiness.com describes tax identity theft as the act of stealing someone’s personal information, ... Views:692
Ever wonder how a motion detector works? How can some inanimate object “know” you’re creeping nearby, even if you’re as quiet as a mouse? This amazing technology can be broken down into several types.
Active Ultrasonic
When an object moves, it can bounce back ... Views:658
Between half and three quarters of all employees have downloaded personal apps to company tablets and phones, according to surveys. At the same time, people are increasingly using use personal phones for work purposes like email, document-sharing and the list goes on.
What does it all ... Views:734
When you go traveling, I’m sure you make a point to protect the various things you bring with you—including your laptop, children, even spouse. But what about something you left behind? Your home? Is that being protected too?
Before Leaving
Don’t wait till the ... Views:671
As part of Gemalto’s #ChipAwayAtFraud campaign, I’m being tasked with numerous tasks, some tacky, some essential to living. Gemalto, one of the world’s leaders in digital security, wants a real-world take on the EMV card experience. Which includes the security benefits EMV ... Views:710
Many so-called psychics are frauds. But so are some auto mechanics, lenders and roofers. There’s fraud in just about all lines of work.
What we do know is this: There’s not enough evidence to refute paranormal phenomena. Nor enough to prove it beyond a doubt.
And ... Views:922
Cyber crime sure does pay, according to a report at Intel Security blogs.mcafee.com. There’s a boom in cyber stores that specialize in selling stolen data. In fact, this is getting so big that different kinds of hot data are being packaged—kind of like going to the supermarket and ... Views:702
Bottom line: If you have a data security policy in place, you need to make sure that it’s up to date and contains all of the necessary elements to make it effective. Here are 10 essential items that should be incorporated into all security policies:
1. Manage employee email
Many data ... Views:786
Your home should have multiple layers of protection. You’ve certainly heard that before. Motion detection is a critical layer of protection, and this is comprised of the simple act of unauthorized movement sensed as the result of breaking and entry. Glass break is similar in concept. One ... Views:832
Frankly, naked babies shouldn’t be a big deal. If you don’t have naked baby pictures of your kids in the kitchen sink then you aren’t human. BUT….the world has changed. If you compare posting your children’s photos online with whipping out a wallet photo of your ... Views:663
Are you thinking of getting a personal loan? Hopefully you have a high credit score, as this will give you a better chance of getting the loan through a legitimate company. But even if your credit is excellent, you need to be aware of the personal loan scams out there.
Not Respecting Your ... Views:670
No bones about it, 2016 is sure to see some spectacular, news-chomping data breaches, predicts many in infosec. If you thought 2015 was interesting, get your seatbelt and helmet on and prepare for lift off…
Wearable Devices
Cyber crooks don’t care what kind of data is in that ... Views:790
Companies are constantly attacked by hackers, but what if those attacks come from the inside? More companies than ever before are dealing with insider security threats.Here are 11 steps that all organizations should take to mitigate these threats and protect important company data:
Always ... Views:765
“I don’t need to lock my doors all the time; this neighborhood is very safe.” And I have some land in the Caribbean I’d like to sell you.
Burglars know that every “safe neighborhood” has a certain percentage of fools who think they’re immune to ... Views:728
Wow cool! A device that lets you know, via Internet, when your milk is beginning to sour! And a connected thermostat—turning the heat up remotely an hour before you get home to save money…and “smart” fitness monitors, baby monitors, watches…
Slow down. ... Views:717
You just learned you have a new credit card account by checking your credit or because a bill collector called you. Problem is that you don’t remember ever applying for it. You must find out what’s behind this new account and how it got there.
Call the corresponding phone number ... Views:819
When it comes to tossing into the rubbish your old computer device, out of sight means out of mind, right? Well yeah, maybe to the user. But let’s tack something onto that well-known mantra: Out of site, out of mind, into criminal’s hands.
Your discarded smartphone, laptop or ... Views:711
For those of you who want to knock your presentations out of the park and be the speaker everyone raves about, Victoria LaBalme is leading an unbelievably unique workshop titled Rock the Room LIVE.
If you create and deliver keynotes, trainings, breakouts, podcasts, videos, webinars or ... Views:659
“You can buy things with your phone!” No kidding! But imagine what the response would have been had you made this statement in 1984: “Off your meds, eh?”
Purchasing via the smartphone may very well eclipse the popularity of shopping via laptop. And cyber thieves ... Views:812
No company is immune from hackers—even a toy company. Hong Kong based VTech got hit by a hacker recently. This company makes techy educational toys for kids, and its database got breached.
Customers go to the Learning Lodge store and download content to their children’s VTech ... Views:727