We are currently looking for an Official SelfGrowth.com Guide to "Identity Theft". If you have expertise in Identity Theft and your own website and/or product for this topic, please review this form for complete details. The Official Guide Position is part of our Premium Placement Package
Who does this?
Morna Brennen did this when she was 22. She and a few friends went to a bar and stayed there late.
At some point while they were there, a man took an interest in Morna. But she was creeped out by him and pretty much ignored him.
Later when it was time to leave, Morna and one ... Views: 1069
Some thieves specialize in hanging around tourist spots to spot the tourists and make them victims of hands-on crime such as purse snatching or a mugging. But don’t wait till you’re aimlessly wandering the piazza with your face buried in a huge map to take precautions against less ... Views: 1068
Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time). And, although we hear about breaches and security flaws in the news, it seems like a lot of us don’t think it applies to our mobile ... Views: 1068
Hackers love LinkedIn because it links them in—straight through the portal of the targeted company. Geez, how much easier could this be, what with all the publically-exposed e-mail addresses of key players (and also worker bees) in big companies that someone wants to hack.
An article on ... Views: 1068
Meet Angee.
Angee (pronounced like Angie) will revolutionize home security in more ways than one. One of the features that sets Angee apart from other home security systems is that this system can learn about you and your family members, and then operate accordingly. Angee is the future, but ... Views: 1067
I really enjoy reading blogs. And since you are here, reading my blog post, I’m guessing you do too. Blogs are a great way of gaining information and learning about different perspectives on a wide variety of topics. Unfortunately, spammers have tainted this medium with splogs.
The word ... Views: 1064
The biggest mistake that you can make to threaten your online safety is to treat the online world different—as far as your private information—than you would treat the physical world. In other words, if someone walked up to you and said, “Hi, can you please provide me with your ... Views: 1063
Burglars actually peruse social media to see who’s on vacation. In fact, 69 burglars were interviewed by Edith Cowan University in Australia, and perusing social media kept coming up as a way to find victims.
Keep your cyber mouth shut till you return. Here are more tips:
Get to know ... Views: 1061
Will the home security scams ever stop? The latest scam has fraudsters going door to door, posing as sales reps for “Trio Alarm.” They first make sure that the houses they visit already have a security system (e.g., security decals on windows), then tell the occupant that the company ... Views: 1060
Wired internet or wireless WiFi, the warnings are out there: Don’t visit any websites that you have important accounts with when using a public computer (hotel, airport, café, etc.).
Visiting even a more trivial account, such as an online community for cheese lovers, could sink ... Views: 1060
Remember that song from 1984, “Somebody’s watching me?” It was a great foreshadowing of things to come: These days, people really CAN watch you while you go about your business at home…through your computer. So if someone confides in you that “they’re spying ... Views: 1058
You have probably heard the story before. Teenage girl takes some scantily clad photos and sends them to her latest boyfriend. “What could go wrong?,” she thinks. Well, a lot could go wrong, and an article on Vice.com really lays that out. You might think that the boyfriend is ... Views: 1057
Bad news for users of the Xfinity home security system: It can report locked doors and windows that have been bypassed by an intruder and miss an intruder’s movements, says an article on wired.com.
The intruder circumvents the system by using a radio jammer to block the 2.4 GHz ... Views: 1056
Healthcare data security is under attack from the inside. While insider threats — due to employee error, carelessness, or malicious intent — are a problem in every industry, they are a particular pox on healthcare data security. Two recent reports illustrate the gravity of the ... Views: 1054
Twitter recently announced its new tool to help with management and monitoring of its users’ accounts: the Twitter data dashboard.
An article on lifehacker.com details what this new tool will offer. For instance, you will not need to use your real name on Twitter—and I have to ... Views: 1053
Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I smell a rat. Literally, a RAT.
A RAT or remote administration tool, is software that gives a person full control a tech device, remotely. The RAT gives the user access to your ... Views: 1053
At any given time, someone, somewhere, is probably googling you. This could be a former classmate, a neighbor, someone you’re trying to do business with, a relative, who knows?
Are you confident that whatever they find will be information that’s truly representative of you? Maybe ... Views: 1052
What is catphishing? It certainly isn’t Garfield lazily sitting in a canoe holding a fishing rod. Catphishing is when a fraudster fabricates an identity and tricks someone via cyber communication into a phony emotional or romantic relationship—usually for financial gain to the ... Views: 1052
According to a recent report from Pew Research, many Americans take privacy seriously—as in the cyber kind, but also offline.
9% of survey respondents thought they had strong control over how much of their personal information was collected and shared.
38% thought they had moderate ... Views: 1051
There’s always a perfect time to assess your home’s safety and security. Do you employ all of the following practices?
Make sure your house’s roofing is fire resistant. If not, get it remodeled.
Not only should you have smoke and carbon monoxide detectors, but you should ... Views: 1046
A phishing attack is a trick e-mail sent randomly to perhaps a million recipients, and the thief counts on the numbers game aspect: Out of any given huge number of people, a significant percentage will fall for the trick.
The trick is that the e-mail contains certain information or is worded ... Views: 1045
You’re dreaming of a white Christmas, and hackers are dreaming of a green Christmas: your cash in their pockets. And hackers are everywhere, and are a particular threat to travelers.
Prior to leaving for your holiday vacation, have an IT specialist install a disk encryption on your ... Views: 1045
There should be more TV commercials for preventing identity theft—it’s nearly epidemic. But also epidemic is the lack of identity security that people have when traveling. Here are some ways to avoid having your identity stolen while traveling:
Prior to leaving for your trip, ... Views: 1043
When someone online presents as a different person than their true self, this is called catphishing, and it occurs on online dating sites.
Google the name of the object of your interest. Obviously, “Kelly Smith” and “John Miller” won’t get you far, but ... Views: 1043
A recent study says that people are more mindful of online safety issues than what experts had previously believed. An article on phys.org says that Nitesh Saxena, PhD, wanted to know what goes on in users’ brains when they come upon malicious websites or malware warnings.
Saxena points ... Views: 1043
We've seen it on a daily basis. Someone that is overloaded with luggage or has one shopping bag to many tries to hail a cab. Then you watch them get inside which may be a production unto itself. After arriving at their destination exiting the cab can also be a study in comedy. But at least they ... Views: 1043
Once a luxury item, free public WiFi has morphed into a standard service that consumers expect when patronizing everything from restaurants and retail stores to airports and hotels. Free WiFi users aren’t just checking Facebook or posting vacation photos to Instagram, either; all of us have sat ... Views: 1042
Think about a time when you had a single credit card lost or stolen, and how much of a pain that experience was. Now imagine if your entire wallet was lost or stolen and the exponential magnitude of pain in the patootie that would be for you.
Run Over by the Bus
If you are a subscriber to ... Views: 1042
Public Wi-Fi is the location where you can get online: airport, airplane, coffee house, hotel, motel and more. Many people don’t give this a second thought, unaware of how risky this really is.
Public Wi-Fi is very non-secure, a goldmine for hackers who want to steal your identity and ... Views: 1041
Please, be humble and consider the possibility that you—yes you—might be committing numerous home security mistakes—that could really cost you if you don’t correct them.
House Alarm Turned Off
Some people only activate it when they are not home and others only ... Views: 1040
It’s about time: a biometric for your smartphone that will change the way you think about biometric security.
This revolutionary biometric comes from Biometric Signature ID and it’s called BioTect-ID, and though it’s a biometric, it does not involve any so-called ... Views: 1039
So just how are hackers able to penetrate all these huge businesses? Look no further than employee behavior—not an inside job, but innocent employees being tricked by the hacker.
A recent survey commissioned by Intel Security reveals that five of the top seven reasons that a ... Views: 1038
So what will you be doing this holiday season to avoid getting scammed? The scammers really come out of the woodwork during the holidays, waiting to snatch their victims. It’s easier than you think to avoid getting ripped off or getting your entire bank account sucked dry. Here’s how ... Views: 1038
You wouldn’t have to worry about privacy issues on Facebook if you didn’t post sensitive, private information on Facebook…such as information that one day can be used against you. And really, you should share only what you consider “professional” information, even ... Views: 1037
Smart criminals love dumb homeowners, but even a dumb burglar can score big when the homeowner makes just a little slip in security measures.
Don’t nickel-and-dime your door locks; get high quality locks. A cheap lock is cheap.
Don’t hide keys. Anyone knows to check under the ... Views: 1036
There are tried and true ways to protect yourself from identity theft—ways that you may not have even considered. Check them out (no specific order):
Evaluate your passwords. Does every online account have a different password or are you using the same one for multiple accounts? Fix ... Views: 1036
Many Americans, says a recent survey by Gallup, worry about a data breach connected to the use of their credit cards. Interestingly, many people use a credit card for everything under the sun: even just a soda and bag of chips from the convenience mart. The more you use a credit card, the more ... Views: 1036
Burglary Protection
Don't forget, protecting your property is not only about safeguarding your valuables. It's also about protecting you and your loved ones. Not every intruder is going to run away if caught in the act. Aggravated burglary and home invasions can be pretty nasty affairs and ones ... Views: 1036
Recently I got a puppy for my child. We decided to name the puppy 4wgu23x5#9. My wife,8yysH3m, thought we should name the dog 0x2%#b5. But I’m sure she’ll get over it. Meanwhile, I’m helping my older child with setting up a few social media accounts, and I suggested the two ... Views: 1033
Don’t wait to be in the dark to find out you’re in the dark. Are you equipped for a power outage? A power outage can even occur in perfect weather, thanks to a construction team “hitting a wire.”
Batteries. Don’t have these scattered haphazardly in some drawer. ... Views: 1032
Whatever the appeal of sexting is to kids (attention), it’s definitely there, and won’t be going away too soon. Of all the things that teens can do in their daily lives, why spend time sexting?
To feel cool
To get a crush’s attention
To make a relationship seem more ... Views: 1030
It’s amazing how ingenious cybercriminals are, but the victims also need to take some responsibility for falling for these ruses, especially when the victim is a business that has failed to train its employees in cybersecurity measures.
Ransomware
The stuff of science fiction is here: ... Views: 1030
You can’t change your fingerprint like you can change your password. But why would you want to change your fingerprint? The thought might cross your mind if your fingerprint gets stolen.
How the heck can this happen? Ask Starbug. He’s a hacker who demonstrated just how this could ... Views: 1029
Spring is in the air (if you’re in the northern hemisphere) and it’s traditionally a time to clean every nook and cranny and get rid of excess stuff in your house. But it’s also a good time to clean up your digital life. Just like your house, your digital life needs a good ... Views: 1027
Work computer. Home computer. Email. Mobile phone.
These are just a few potential avenues that can be a security threat.
Digital privacy invasion is a real threat. One that you are at risk for every day, and may not even know it.
'Big brother'...the powers that be in Washington along ... Views: 1027
Ever hear of a crime called skimming? It may not be as dramatic a crime as assault or Ponzi schemes, but it can cause significant problems to you as your savings account can be wiped out in a flash.
Picture a scrawny nerd tampering with an automated teller machine (ATM)—the ... Views: 1027
Does your Lenovo computer have Superfish VisualDiscovery adware (a.k.a. spyware) installed? It’s possible if you purchased a Lenovo PC any time in September of 2014 and thereafter.
This Superfish software intercepts the Lenovo user’s traffic so that the user sees ads displayed ... Views: 1024
Not too long ago, the office computer filled an entire room. Now, it fills the palms of one-third of employees—those workers who use only the mobile device for their jobs. Security, however, lags behind in keeping up with this growing trend. This is the BYOD generation: bring your own ... Views: 1024
If you think there’s like a million apps out there, that’s not exactly an exaggeration. For sure, there are more than you can imagine, which makes it easy to conceive that many certainly come with security problems.
In fact, out of the top 25 most popular apps, 18 of them bombed on a security ... Views: 1023
The competition among the numerous companies that make up the notch of every business endeavor calls for a mechanism that will protect the interests of the company from predators that are out to steal valuable information from their rivals. There should be as a matter of fact the availability of ... Views: 1023