If someone is “borrowing” your Wi-Fi service, there’s more to this than just the nerve of someone secretly mooching off of you.
Their use of your service could interfere with bandwidth and mess up your connection. If they’re a bad guy hacker or even a skeevy child porn ... Views: 1014
Please, be humble and consider the possibility that you—yes you—might be committing numerous home security mistakes—that could really cost you if you don’t correct them.
House Alarm Turned Off
Some people only activate it when they are not home and others only ... Views: 1035
There’s always a perfect time to assess your home’s safety and security. Do you employ all of the following practices?
Make sure your house’s roofing is fire resistant. If not, get it remodeled.
Not only should you have smoke and carbon monoxide detectors, but you should ... Views: 1041
If you are like most people, there are several devices in your home that fight for WiFi connections at any given time. This slows your network, and gives you a shoddy experience. Instead, look into upgrading your system immediately and save some cash too.
The Nighthawk is a 2-in-1 cable ... Views: 830
Most people don’t like that “fall back” time change every November, but you know who does? Burglars. Burglars love to “fall back” because it gives them more time to practice their criminal activities thanks to the earlier veil of darkness. This is also a convenient ... Views: 976
So, who’s on your holiday gift list this year? That list is a lot longer than you think; consider all the names of hackers that have not yet appeared on it. Scammers will do whatever it takes to get on your holiday gift list! Here’s how to keep these cyber thieves out of your ... Views: 885
Define Pwn: Pwn is a slang term derived from the verb own, as meaning to appropriate or to conquer to gain ownership. The term implies domination or humiliation of a rival. And when it’s done by hacking email, the person is effectively pwned. No matter how “private” you ... Views: 939
There’s a name for the survival sack that you take with you outdoors in the event of survival emergency: bugout bag.
Let’s start with the key components to net a three-day survival:
Water: one liter per person per day
Food: “energy bars” or backpack meals
Small ... Views: 967
A phishing e-mail is sent by a cyberthief to trick its recipient into revealing sensitive information so that the crook could steal money from the recipient or gain access to a business’s classified information. One way to lure an employee is for the crook to make the e-mail appear like it ... Views: 892
The Internet has almost as many videos as there are stars in the heavens. And you know that some have to be hoaxes. Sometimes it’s obvious, while other times it’s easy to be fooled. For example, the hoax of the “angel” intercepting a truck just about to run over a ... Views: 935
What do you really know about water storage? Below you’ll find information that you probably never even thought of before, or information that contradicts what you’ve always believed to be correct.
Storage barrels. These can remain on cellar or basement cement that’s not ... Views: 925
With Cyber Monday, you don’t have to camp outside in the cold overnight so you can be the first person busting through the doors like on Black Friday. But you still may get trampled to a pulpby cyber scammers waiting for their prey.
How can you avoid these predators?
You know that ... Views: 826
This application for your mobile device will change things in a huge way:
Locks down smartphones with a finger-based biometric password
Multi-factor authentication all-in-one
It’s called BioTect-ID
And why should you consider the world’s first biometric password for your ... Views: 1097
There should be more TV commercials for preventing identity theft—it’s nearly epidemic. But also epidemic is the lack of identity security that people have when traveling. Here are some ways to avoid having your identity stolen while traveling:
Prior to leaving for your trip, ... Views: 1040
A bug bounty refers to the reward a bad-guy hacker gets upon discovering a vulnerability, weakness or flaw in a company’s system.
This is akin to giving a reward to a burglar for pointing out weaknesses in your home’s security.
But whom better to ask than a burglar, right? Same ... Views: 902
After receiving medical treatment, many people never look over the paperwork (save for bill total) and just shove it into some folder in a file cabinet. But medical identity theft is very much out there; know the signs:
You’re denied coverage because you allegedly have a condition you ... Views: 827
Every time you have a medical procedure done, including routine checkups and treatment for minor issues, paperwork is generated. You should have copies of every single paper. This is one line of defense against medical identity theft.
Review your paperwork thoroughly for unauthorized or ... Views: 841
Do these bank robbers have bricks for brains? They actually posted photos of themselves with wads of the stolen cash on Facebook, says a story on thesmokinggun.com.
The alleged bank robers are John Mogan, 28 and Ashley Duboe, 24, and they’ve been charged with robbing a bank in Ohio. ... Views: 866
It’s about time: a biometric for your smartphone that will change the way you think about biometric security.
This revolutionary biometric comes from Biometric Signature ID and it’s called BioTect-ID, and though it’s a biometric, it does not involve any so-called ... Views: 1033
The Bring Your Own Device (BYOD) movement has in some ways saved companies money, but in other ways put customer data at risk. Employees are onsite, telecommuting or traveling on business. This means their devices, and company data could be anywhere at any given moment.
A company manager or ... Views: 910
Your child is active online. Did it ever occur to you that he or she uses a fake name so that they can’t be identified by you? Chances are, you, the parent, also uses a pseudonym. It’s very common.
Cyberspace is full of obvious pseudonyms, but a phony name can also be a regular ... Views: 906
These days, who doesn’t travel with their laptop? But commonality doesn’t make it inherently safe for your sensitive information that’s stored in the device. In fact, traveling with your laptop is inherently unsecure.
Whether you’re traveling for business or to visit ... Views: 902
It’s been stated more than once that WWIII will most likely be cyber-based, such as dismantling a country’s entire infrastructure via cyber weapons. And don’t think for a moment this doesn’t mean murdering people.
A report at bits.blogs.nytimes.com notes that foreign ... Views: 888
You’ve probably heard of the gofundme.com site, where all sorts of stories are posted of people seeking donations. Some are tragic, others are trite. You may be touched by a particular story, perhaps one in which an entire family is killed in a house fire.
You click the “Donate ... Views: 879
LinkedIn is a free service that allows professional people to network with each other. Often, a LinkedIn member will receive an e-mail from another LinkedIn member “inviting” them to join their network. Sometimes, the inviter is someone the recipient doesn’t know, but the ... Views: 865
So you think it’s really a far-out left-field idea: a burglar studying Facebook and other social media to select homes to rob. Well think again.
A survey, conducted by home security expert Friedland, found:
78 percent of burglars use social media to select targets.
74 percent touted ... Views: 955
One in four (25 percent) of college women reported they received unsolicited sexual contact while in college, says the recent Association of American Universities Campus Climate Survey of 150,000 students.
How can on-campus safety be heightened?
Students should have a hardcopy and ... Views: 992
Part of my role as security guy is to keep tabs on the crime climate around the globe. Recently I kept seeing article after article about burglaries with one common theme: “door kicked in”. Don’t believe me? See below. But before you do, probably all of these could have been ... Views: 957
A man was assaulted by three or four men when he arrived home, through his garage door at 5:40 a.m. It’s very apparent that the attackers knew he’d be arriving home at around this time and decided to wait for him, says a report at ksla.com.
This recent home invasion occurred in ... Views: 801
Angee, the new Kickstarter campaign that raised over $250,000 already, will revolutionize home security in more ways than one. Meanwhile, get going on these 20 home security tips:
Keep all doors and windows locked at all times. Yes, on hot summer days it’s tempting to keep windows ... Views: 1148
Okay, so you’re 18 or 19 and in college, and are stressed because you have to be 21 in order to gain entry to a night club or bar where you’d like to drink up a storm and mingle with a “more mature” crowd. Or really, you just want to meet someone.
Life sure is tough, ... Views: 937
There are numerous subspecialties within the booming cybersecurity field[i]. Here are some of the most in-demand professions:
Cybersecurity Engineer: This is the all-around, jack-of-all-trades, go-to guy or gal of cybersecurity. For all intents and purposes, a cybersecurity engineer is a ... Views: 1014
It can be tough being a responsible adult sometimes, and managing these responsibilities isn’t always a chore that I want to deal with. Can you relate? Managing life takes focus and effort, and managing your online life is no different. Most of us are lazy with our online accounts, ... Views: 904
Companies that cut corners by giving cybersecurity training only to their technical staff and the “big wigs” are throwing out the welcome mat to hackers. Cyber criminals know that the ripe fruit to pick is a company’s sales staff. Often, the sales personnel are clueless about ... Views: 819
If I wanted to crack one of your passwords, I could probably make a series of educated guesses and get pretty close. Why? Because people tend to stick with simple, easy to remember passwords, but these are the passwords that are easy to hack. According to Bill Carey, VP Marketing for ... Views: 893
There’s a problem on the home front: security lapses in the computers of the Secret Service and Immigration and Customs Enforcement, says a report on townhall.com. These departments were recently audited, and weaknesses were revealed.
Recently, hackers got into the White House, State ... Views: 867
There are many reasons someone might right-click on your image and “Save image as…”
Porn, Sex and Dating Sites
A woman might steal your blog headshot and use it for her dating site profile.
A perv might take the picture of your child off your Facebook page and put it on ... Views: 886
If you have made the decision to use a password manager for your personal cybersecurity, which I highly recommend, you will quickly find that you online world is safer, easier and more secure than ever before.
According to a recently concluded survey conducted by uSamp and sponsored by Siber ... Views: 800
How would you like a home security system that’s also your personal assistant? Angee Inc., a new company out of San Francisco, knows you’d like one.
Features of the Angee Device
Smartphone controlled
Has a Full HD camera with night vision.
Learns habits of and senses presence ... Views: 918
Hah, that dual chamber deadbolt and the door jamb reinforcement! Yup, they’re good at keeping thieves from getting to your jewelry box and stash of $100 bills, but what about your bank accounts and identity?
If you have any “smart” gadgets in your house, cybercriminals may ... Views: 974
One difference between a credit card and a debit card is that if there’s an unauthorized charge on your credit card, you just get a little sting. It’s a hassle to straighten out. But no money is taken from you.
But if someone gets ahold of your debit card information, the second ... Views: 1012
Home safes aren’t just for expensive jewels and wads of $100 bills. They can be for anything you’d be crushed about if it were stolen, lost or burnt in a fire. This could be a birthday card that your child made for you when they were five, or a photo of you and your ... Views: 850
You’ve seen TV commercials and print ads about identity theft, and the “victim” is always an adult. That’s not realistic. The actor-portrayal should be that of a child. Yes, a kid.
Children are 51 times more likely than adults to have their identity stolen, says ... Views: 850
If you are like me, you have several online accounts, each with a user name and password. Though it is tempting to use one password for every account, this can be troublesome as it is a huge security risk. So, what is your only option? To use a password manager.
According to a recently ... Views: 779
Who has time to think about identity protection when planning a wedding? And why, for that matter? Well, there’s good reason: Marriage begets a change in identities. The months preceding the big day should be when the couple starts taking action to avoid identity theft.
If ... Views: 896
Consider a keychain for a moment. For most of us, a keychain holds all of our necessities such as home keys, car keys, work keys and even forgotten keys, that we aren’t quite sure what to do with. Now, think about this. What if your keychain had keys that look identical, but each key only ... Views: 827
Danny Wheeler was alerted by his smartphone that had a home security app and a do it yourself camera/home security system that his home was being robbed. He was at work and could do nothing but send the real time video to New York City police, reports a story on abcnews.go.com. The burglars got ... Views: 922
Just because a job recruiter says he’s from (fill in blank—any huge corporation) doesn’t mean the job can’t be a scam. Anyone could say they’re from Microsoft or Google. Impersonating a representative from a big-name company is one way to fool gullible job ... Views: 1284
Studies across the board indicate that weak usernames and passwords are one of the top causes of data breaches, and I find that information to be unfortunate, because it is preventable. According to a recently concluded survey conducted by uSamp and sponsored by Siber Systems, creators of ... Views: 810
Meet Angee.
Angee (pronounced like Angie) will revolutionize home security in more ways than one. One of the features that sets Angee apart from other home security systems is that this system can learn about you and your family members, and then operate accordingly. Angee is the future, but ... Views: 1060