Once a thief knows your Social Security number…you’re at very high risk for having your identity stolen.
A report on bankrate.com says that the IRS is warning of a cyber attack on its electronic filing PIN application. Thieves infiltrated it with malware in an attempt to claim ... Views: 860
You might not realize it, but your electronic devices may be tracking you. They know what you are doing, what you are reading, and the things you like to do. In almost every case, you give these devices permission to collect this info when you start using them. Here are some tips to help you ... Views: 893
You need not be a celebrity or some big wig to suffer the devastating fallout of your online images (and videos) being stolen or used without your permission.
So how does someone steal your image or use it without your permission?
Hacking
Hacking is one way, especially if passwords are ... Views: 934
There are many reasons someone might right-click on your image and “Save image as…”
Porn, Sex and Dating Sites
A woman might steal your blog headshot and use it for her dating site profile.
A perv might take the picture of your child off your Facebook page and put it on ... Views: 895
What are you doing to prevent tax identity theft? Do you even know what steps to take? You’d better, because this crime has tripled since 2010, says the FTC.
A report on foxbusiness.com describes tax identity theft as the act of stealing someone’s personal information, ... Views: 835
Social Security numbers and credit card numbers are not the only types of data that hackers are after. Now, they are looking at frequent flyer accounts, and they are stealing reward miles, and then selling them online.
How do Hackers Steal Frequent Flyer Miles?
As with other types of ID ... Views: 830
If you are in the process of buying or selling a home, at some point, you are going to have to disclose personal information when you go through the process. Because of this, a home buyer, especially, is much more likely to become a victim of identity theft.
Here are some ways to protect your ... Views: 662
Let’s cut to the chase:
Regularly back up the phone’s data! If this is done every day, you won’t have to worry much about losing important information if something happens to the phone—such as a ransomware attack.
Keep the phone’s software and applications ... Views: 874
You may be putting your company at risk simply by hiring a new employee. Why? Because that person could have a hidden, malicious agenda.
This is known as an inside threat, and it means that someone within your organization is planning or conducting activities meant to harm the company.
There ... Views: 801
Define Pwn: Pwn is a slang term derived from the verb own, as meaning to appropriate or to conquer to gain ownership. The term implies domination or humiliation of a rival. And when it’s done by hacking email, the person is effectively pwned. No matter how “private” you ... Views: 955
So someone comes up to you in a restaurant—a complete stranger—and asks to look at your driver’s license. What do you do? Show it to that person? You’d have to be one loony tune to do that.
However, this same blindness to security occurs all the time when a person is ... Views: 1009
Would you give up your bank account and credit card numbers to a stranger on the street after he approaches and asks for them? Of course not. But that’s essentially what people do when they’re tricked by online crooksters into revealing sensitive personal information, including their ... Views: 948
When it comes to tossing into the rubbish your old computer device, out of sight means out of mind, right? Well yeah, maybe to the user. But let’s tack something onto that well-known mantra: Out of site, out of mind, into criminal’s hands.
Your discarded smartphone, laptop or ... Views: 855
You just learned you have a new credit card account by checking your credit or because a bill collector called you. Problem is that you don’t remember ever applying for it. You must find out what’s behind this new account and how it got there.
Call the corresponding phone number ... Views: 956
For those of you who want to knock your presentations out of the park and be the speaker everyone raves about, Victoria LaBalme is leading an unbelievably unique workshop titled Rock the Room LIVE.
If you create and deliver keynotes, trainings, breakouts, podcasts, videos, webinars or ... Views: 783
Before embarking on a road trip with a car full of kids, make sure everything about the vehicle is in top working condition, including the windshield wipers, A/C, heat, fluid levels, seatbelts and lights (exterior and interior).
Hopefully you’ll have a GPS; make sure that works, too; ... Views: 821
I love that show, “Forensic Files.” Every so often there’s the case of a person who was found murdered in their apartment due to some forced entry. Which brings me to the topic of apartment security.
New Apartment
Don’t delay in doing a walk-through of the entire ... Views: 872
It doesn’t matter who you are or where you live, your home is at risk of being burglarized. According to numerous studies, in the US alone, a burglary occurs about once every 18 seconds, which equates to about 5,000 a day.
Fortunately, you can secure your home or business against ... Views: 827
If you have made the decision to use a password manager for your personal cybersecurity, which I highly recommend, you will quickly find that you online world is safer, easier and more secure than ever before.
According to a recently concluded survey conducted by uSamp and sponsored by Siber ... Views: 814
“You can buy things with your phone!” No kidding! But imagine what the response would have been had you made this statement in 1984: “Off your meds, eh?”
Purchasing via the smartphone may very well eclipse the popularity of shopping via laptop. And cyber thieves ... Views: 952
Let’s cut to the chase (never mind how you misplaced your phone): There are several ways to sign out of your Google accounts remotely. It takes three steps, and you’ll need the desktop version of Google.
On a mobile use a browser opposed to the Gmail/Google app and sign in at ... Views: 1158
I really enjoy reading blogs. And since you are here, reading my blog post, I’m guessing you do too. Blogs are a great way of gaining information and learning about different perspectives on a wide variety of topics. Unfortunately, spammers have tainted this medium with splogs.
The word ... Views: 1073
Maybe you don’t mind the ads for that bicycle rack following you around in cyberspace after you visited a site for all things bike, but browser trackers (“cookies”) also create a profile of you that gets sold to other advertisers and third parties.
Are you doomed to be ... Views: 1119
Sexting is the act of sending images of a sexual nature via cell phone, often naked pictures. Because texting technology is so readily available and easy to understand, parents should be quite leery of telling themselves, “Oh, MY kid would never do that!” Studies showy your kid ... Views: 897
What do you really know about water storage? Below you’ll find information that you probably never even thought of before, or information that contradicts what you’ve always believed to be correct.
Storage barrels. These can remain on cellar or basement cement that’s not ... Views: 939
If the person you are sending an e-mail to pretty much instantaneously receives it, how on earth can you unsend or cancel it? Well, you have several options.
Criptext
This is a browser plug-in that works for Chrome and Safari.
Your message including attachments will be encrypted.
You ... Views: 901
Have a small business? Great. Have two-factor authentication for your accounts? If you’re not sure of the answer to that question, you could be in trouble. October is National Cyber Security Awareness Month, the perfect time to learn more about cyber security. As a small business owner, ... Views: 849
How many times have you read, or at least caught a headline, of the latest high profile missing child case? How many stories have we heard about the kid who got lost on a hike? His body was found several miles from where he’d been last seen, concluding a several-day search.
What if he ... Views: 797
A phishing attack is a trick e-mail sent randomly to perhaps a million recipients, and the thief counts on the numbers game aspect: Out of any given huge number of people, a significant percentage will fall for the trick.
The trick is that the e-mail contains certain information or is worded ... Views: 1054
Ever wonder how a water leak sensor actually works?
Water comes into contact with the sensor. The sensor makes and electrical contact and send a signal.
The sensor transmits a signal to a central station of sorts (kind of like how if extreme heat or a needle comes in contact with your ... Views: 842
A recent study says that people are more mindful of online safety issues than what experts had previously believed. An article on phys.org says that Nitesh Saxena, PhD, wanted to know what goes on in users’ brains when they come upon malicious websites or malware warnings.
Saxena points ... Views: 1051
You probably have a few usernames, or you might have just one that you use for every site. Either way, your user names can be used not just to identify you online, but it can also be used to track you and find out information about you. How do people track you based on your user name? They do ... Views: 738
Remember that song from 1984, “Somebody’s watching me?” It was a great foreshadowing of things to come: These days, people really CAN watch you while you go about your business at home…through your computer. So if someone confides in you that “they’re spying ... Views: 1067
National Preparedness Month is happening right now. It’s the perfect time to take action for you and your community. It’s all about making plans to remain safe, and when disasters do strike, to keep communications going. September 30th is the culmination of NPM, with the National ... Views: 899
According to a new study, genetics and evolution have made an impact on the murderous behavior of the human species. However, becoming civilized has tamed some of these instincts.
Scientists have looked at the homicide rate of more than 1,000 species that kill their own, and noticed that ... Views: 807
Well, we certainly can’t blame Dennis Nicholl for breaking the law. Frankly, had I been nearby him when he did it, I would have kept silent and let him continue breaking the law—unless, of course, I was engaged in some loud, planet-moving discussion with a world leader.
Nicholl, ... Views: 828
Yes, identity fraud is SO common that someone becomes a victim every two seconds. The 2014 Identity Fraud Study, as reported on javelinstrategy.com, turned up some alarming results.
Though the dollar amount stolen had decreased over the year preceding the study, the number of victims had ... Views: 886
13.1 million people were stricken by identity theft last year in America, reports a study by Javelin Strategy & Research which reveals:
Many people who don’t trust their banks are unwittingly doing things that make crime easier for crooks. This includes not using the bank’s ... Views: 784
What’s it called if, for example, someone runs up your credit card line without your permission? Identity theft. ID theft isn’t necessarily someone going around impersonating you. But it is considered someone taking over your accounts.
Account takeover is also someone hacking into ... Views: 1118
About 7 a.m. on a Saturday a burglar entered a home through an unlocked side door (how anyone can sleep overnight while a door stays unlocked is a whole new article).
The dumb criminal saw an iPhone and unknowingly triggered a video selfie—showing him standing in the living room during ... Views: 951
Have you heard of iDict? It’s a tool that hackers can use to get passwords via what’s called brute force attacks. It’s designed to crack into iCloud’s passwords, and supposedly it can circumvent Apple’s anti-brute force attack security.
But iDict doesn’t ... Views: 993
If you plan on getting a new smartphone, have you ever thought of what the next user of your old smartphone will find on it?
This assumes you’ll be selling or donating it, of course. Are you SURE those risqué photos are totally gone, or that your diary entries have been wiped ... Views: 1081
As the holiday shopping season quickly approaches, identity thieves are quickly looking for their next victims. In Indiana, government officials are taking steps to stop these thieves in their tracks. Just recently, the state’s Attorney General Greg Zoeller was in Fort Wayne to announce ... Views: 1130
It’s been stated more than once that WWIII will most likely be cyber-based, such as dismantling a country’s entire infrastructure via cyber weapons. And don’t think for a moment this doesn’t mean murdering people.
A report at bits.blogs.nytimes.com notes that foreign ... Views: 906
Companies that want to employ at-home workers for their call centers to save money and reduce the hassles of office space have to look at security considerations. In addition to thorough vetting of the agents and their equipment, organizations also need to ensure that the security is top-notch. ... Views: 880
Trick e-mail = fraudulent wire transfer = hundreds of thousands to millions of dollars stolen.
That’s what’s happening with business executives in select industries (e.g., chemical operations, manufacturing), says a report at threatpost.com, citing a finding from Dell ... Views: 824
Meet Angee.
Angee (pronounced like Angie) will revolutionize home security in more ways than one. One of the features that sets Angee apart from other home security systems is that this system can learn about you and your family members, and then operate accordingly. Angee is the future, but ... Views: 1078
This application for your mobile device will change things in a huge way:
Locks down smartphones with a finger-based biometric password
Multi-factor authentication all-in-one
It’s called BioTect-ID
And why should you consider the world’s first biometric password for your ... Views: 1109
Gone are the days when social media is only used to share what you had for dinner or announcing to the world that you are headed to the gym. But social media has become a platform for any and everyone to say what’s on their mind, and sometimes that’s great, but all too often it ... Views: 947
The Identity Protection PIN tool on the IRS.gov site has been temporarily suspended—because it was recently hacked into. The tool provides retrieval of forgotten or lost IP PINs to users who want an extra layer of protection against identity theft.
But some users who received the IP ... Views: 762