Would you give up your bank account and credit card numbers to a stranger on the street after he approaches and asks for them? Of course not. But that’s essentially what people do when they’re tricked by online crooksters into revealing sensitive personal information, including their ... Views: 928
Gone are the days when social media is only used to share what you had for dinner or announcing to the world that you are headed to the gym. But social media has become a platform for any and everyone to say what’s on their mind, and sometimes that’s great, but all too often it ... Views: 928
You’ve been “Googled.” No matter how small a speck you think you are in this universe, you have without a doubt created an online footprint that is attached to your name. Chances are high that someone out there has followed this footprint of yours via a Google ... Views: 928
Myth: Most burglaries occur at night when nobody can see the intruder.
Fact: Most burglaries occur during the day because criminals know that’s the most likely time that people are away at work.
Myth: Most burglaries are random and spontaneous.
Fact: Most burglaries occur after the ... Views: 928
You don’t always have to outmuscle a assailant to beat him at his game. This is what a New Zealand woman learned after Vipul Romik Sharma abducted her. At first, things seemed fine; she exited a bar in Otahuhu with the 22-year-old and another man. Then they kidnapped and raped ... Views: 926
It’s good to have a stash of cash for emergencies. If the grid goes down and the power goes out, an ATM or bank does you no good. But there are security issues too. Where do you put it? A safe is certainly a smart idea. You can get creative too.
What burglar would not think to look ... Views: 925
Imagine a lifeguard at the beach sitting on his perch. His job is to patrol and monitor for signs of trouble. He sees a surfer being attacked by a shark. Wow, a lot of good it does that he’s in a completely helpless position; by the time he scrambles off his perch and runs towards the ... Views: 925
It’s hard to believe that, according to a recent poll from the Pew Research Center, most Americans aren’t too upset that the government can track their e-mails and phone calls. There’s too much of a blasé attitude, it seems, with people thinking, “I don’t ... Views: 924
You will love the Tri-Band WiFi technology; it can connect all of your devices at the same time. The only router capable of this is the Netgear Nighthawk X6 AC3200 Tri-Band Wi-Fi Router (a.k.a. Netgear R8000).
This router provides three connections and has six wing-like antennas. Another ... Views: 923
What do you really know about water storage? Below you’ll find information that you probably never even thought of before, or information that contradicts what you’ve always believed to be correct.
Storage barrels. These can remain on cellar or basement cement that’s not ... Views: 922
Who needs guns, threatening notes to rob a bank when you can do it with just your fingertips inside your home?
A hacking ring in the eastern portion of Europe may be the most successful team of bank robbers to date, having purportedly robbed $1 billion from multiple banks. This can only be ... Views: 922
One of mankind’s greatest inventions (besides the wheel) is the Internet.
Unfortunately, with this marvelous invention comes the drawback of privacy—or shall we say, lack of.
The Internet is a wonderful tool, but users must fight to remain as anonymous as possible, because ... Views: 922
Question: No. 1 reason people get a home security system?
Answer: Recently burglarized; The majority of the people I hear from who want to install a home security system were recently burglarized. It often takes adversity or even tragedy for us to wake up to the realities of a harsh ... Views: 922
Criminals use six basic principles to influence and steal. In the first post we discussed:
Reciprocation: Do something nice for a person and they will feel obligated to return the favor.
Social Proof: This is the “It’s okay if everyone else does it” approach.
Commitment ... Views: 921
No bones about it, 2016 is sure to see some spectacular, news-chomping data breaches, predicts many in infosec. If you thought 2015 was interesting, get your seatbelt and helmet on and prepare for lift off…
Wearable Devices
Cyber crooks don’t care what kind of data is in that ... Views: 920
When you subscribe to an online service, be careful of how much information you give out about yourself.
Most businesses in their terms and conditions, say they “respect your privacy.” But what if these companies go under or are sold? An article from the online New York Times ... Views: 920
If you’re planning a lengthy road trip, there are many things you’d never think to bring with you that could get you out of a crisis situation. You need way more than just that blanket in the trunk, car jack and spare tire, umbrella, rainproof poncho, utility tool and fire ... Views: 920
Ever peruse Craigslist for a new home? Nothing against Craigslist for doing that, but that’s where Coty Houston and David Yost happened to find a very alluring four-bed home for sale; looked perfect for their five young kids.
Then they all got squashed by a bomb: The man who sold it to ... Views: 919
What’s going on this September? National Preparedness Month. This will be the time to increase your awareness of the safety of your business, family, pets and community. During disasters, communication is key. National Preparedness Month concludes on September 30 with the National ... Views: 919
Danny Wheeler was alerted by his smartphone that had a home security app and a do it yourself camera/home security system that his home was being robbed. He was at work and could do nothing but send the real time video to New York City police, reports a story on abcnews.go.com. The burglars got ... Views: 918
You need not be a celebrity or some big wig to suffer the devastating fallout of your online images (and videos) being stolen or used without your permission.
So how does someone steal your image or use it without your permission?
Hacking
Hacking is one way, especially if passwords are ... Views: 918
The Russians have come…again—in the form of hackers. Not long ago Russian cyber criminals busted into the U.S.’s State Department system and mangled it for months.
This time, they got into a computer system at the White House. Luckily, this system did not hold any ... Views: 918
Cane
If you use a cane, take “cane-fu” classes if possible. Yes, it’s a thing.
A sturdy cane with a strong handle works best.
Do not assume you can fight with a cane just because you need one to walk.
Avoid a cane with a hidden knife or sword unless you specifically ... Views: 917
Years ago, having “the talk” with your kids meant telling them where babies come from. Nowadays, “the talk” has a whole new meaning. Your kids may be able to explain in detail how a baby is created, but may be clueless (because so many adults are) about something called ... Views: 915
Do you know what ATM stands for? For crooks, it stands for A Thief’s Moneymaker.
A new report from FICO says that “skimming” crimes have made their biggest spike in the past 20 years. This includes ATMs on bank premises, but of course, public ATM kiosks have seen the biggest ... Views: 914
What goes on in the home life of a 14-year-old girl such that she feels there’s nothing better to do than send nude photos of herself to a man whom she’s been corresponding with online? Though this goes well-beyond the parents not bothering to find out what their kids do online, ... Views: 914
In the event of an attack, new smartphone applications can be used to send an alarm to a pre-chosen person. And the potential victims location can then be tracked.
But is this faster and more secure than a woman whipping out pepper spray and blasting a drunken buffoon who has her cornered in ... Views: 913
How would you like a home security system that’s also your personal assistant? Angee Inc., a new company out of San Francisco, knows you’d like one.
Features of the Angee Device
Smartphone controlled
Has a Full HD camera with night vision.
Learns habits of and senses presence ... Views: 913
It’ll get worse before it gets better: online data safety. It’s amazing how many people think they’re “safe” online, while one huge business or entity after another keeps getting hacked to the bone.
And “safety” doesn’t necessarily mean the ... Views: 912
If you’re going to drone on and on about how you got hacked by a cyber thief, maybe it’s because you played with your new drone—you know, those rad little flying devices that hover via remote control over your street? Yes, they are hackable.
If you don’t have a drone, ... Views: 911
You have a master password, from your password manager, for 28 accounts. Life has been so easy since!
But then you lose this master password. First off, you can’t fix this like you would if you forgot your password for PayPal or your credit card’s site. Plus, each password manager ... Views: 911
In this day and age, we should never hear someone proclaim, “Oh my God, my computer crashed! I lost everything!” You can’t lose something that’s been properly backed up.
So many people, including ones with businesses that rely upon cyber communication, continue to ... Views: 910
Yes, it’s possible: preventing fraudsters from getting you via online trickery and other stealthy actions. Yes, it’s possible to be thinking one step ahead of cyber criminals. Let’s begin with e-mails—the conduit through which so many cyber crimes like ID theft ... Views: 910
Logins that require only a password are not secure. What if someone gets your password? They can log in, and the site won’t know it’s not you.
Think nobody could guess your 15-character password of mumbo-jumbo? It’s still possible: A keylogger or visual hacker could obtain ... Views: 909
“My house was hacked!” Had you said this 25 years ago, people would have thought a burglar vandalized it with an axe. Say it today and nearly everybody will know what you mean: A thief or prankster “broke” in to your house via its connected-to-the-Internet gadgets.
If ... Views: 909
You’re sitting on your front porch. You see a stranger walking towards your property. You have no idea whom he is. But he’s nicely dressed. He asks to come inside your house and look through your bank account records, view your checkbook routing number and account number, and jot ... Views: 909
When it comes to online security, don’t let your guard down just because the holiday shopping frenzy has passed. In fact, this may be the very time to put your guard up even higher.
Though it’s smart to have your radar on for the scammers during the holidays, the scammers ... Views: 909
Maybe you believe that kids should not have smartphones because the devices can tell a pedophile where a child is located. But there’s other reasons that perhaps you haven’t thought of: cyberbullying, violent porn, online drug purchases, you name it.
Smartphones give kids ongoing ... Views: 909
Bottom line: If you have a data security policy in place, you need to make sure that it’s up to date and contains all of the necessary elements to make it effective. Here are 10 essential items that should be incorporated into all security policies:
1. Manage employee email
Many data ... Views: 908
The old TV show “Star Trek” has and episode where Spock is telling Kirk of a human flaw called intuition. Spock was all about analysis and logic, while Kirk often relied upon intuition to solve problems. Intuition is a complex human sense that isn’t entirely understood or even ... Views: 908
Those were the days when all parents had to worry about was the creepy guy lurking near the playground. Now parents have to worry about creeps all over the world reaching their kids via computer. And there’s more to worry about. Here’s what to teach your kids:
Screen names ... Views: 908
The Bring Your Own Device (BYOD) movement has in some ways saved companies money, but in other ways put customer data at risk. Employees are onsite, telecommuting or traveling on business. This means their devices, and company data could be anywhere at any given moment.
A company manager or ... Views: 906
Who needs psychics to reveal future lottery numbers when you can hack into the state lottery association and tamper with it? That apparently was the reasoning of Eddie Raymond Tipton, 51.
Prosecutors believe Tipton inserted a thumb drive into a computer—the one that spits out random ... Views: 906
Hackers know small companies are more vulnerable to data breaches due to limited resources. Cybersecurity should always be a high priority. But when a company’s IT staff consists of maybe 1-2 people who are provided limited budgets and are constantly solving other tech problems, the focus ... Views: 906
Want to earn up to $4.2 million? Then find the hackers on the FBI’s most wanted list. Or at least give the FBI information leading to their arrest and/or conviction. These snakes have stolen hundreds of millions of dollars. Here is the list from the hackernews.com:
Evgeniy Mikhailovich ... Views: 906
A study published in Nature shows us that both evolution and genetics have made a big impact on the behavior of humans…including in the case of murder. However, as we have become more civilized, these instincts have been muted.
Scientists have looked at the rate of homicide in more ... Views: 904
Situations that could put your routine or an entire city on hold include:
Tornado
Hurricane
Flood
Blizzard
Power outage
Contagious illness
Your house should already be equipped with supplies for staying inside the house for at least a week, but ideally for two weeks.
Keep a newer ... Views: 903
“I had my earphones in and didn’t know he was there until he threw me to the ground,” says Taela Davis, 25, of Australia in a heraldsun.com article.
Big Mistake: Wearing earbuds while walking about in public. Even if you’re a big bruiser MMA fighter, you should not ... Views: 903
Companies are constantly attacked by hackers, but what if those attacks come from the inside? More companies than ever before are dealing with insider security threats.Here are 11 steps that all organizations should take to mitigate these threats and protect important company data:
Always ... Views: 902
When is the last time you thought about the safety and security of your home? How about thinking about it right now? Do you do the following? If not, start, today:
Do you have propane tanks for a gas grill? Or gasoline cans with gas in them? They aren’t supposed to be stored inside. ... Views: 902