We are currently looking for an Official SelfGrowth.com Guide to "Identity Theft". If you have expertise in Identity Theft and your own website and/or product for this topic, please review this form for complete details. The Official Guide Position is part of our Premium Placement Package
Many people, including myself, make mistakes with their passwords and use them on site after site. To remain safe, it’s important to use a unique, strong password on every site you visit. How do you do this the easy way? Use a password manager.
According to a recently concluded survey ... Views: 1056
Most people don’t like that “fall back” time change every November, but you know who does? Burglars. Burglars love to “fall back” because it gives them more time to practice their criminal activities thanks to the earlier veil of darkness. This is also a convenient ... Views: 1055
Whether you’re an animal person or not, you have to admit that puppies are pretty darn cute. So cute that there are YouTube Channels, Facebook accounts, and Buzzfeed newsletters devoted to the subject. Unfortunately, there’s a not so cute PUP out in the world, and it wants access to ... Views: 1055
Where’s the $$$ at? Selling credit card data. Have you heard of the Russian hacking ring that raked in two and a half billion dollars? Check it out:
Phishing attacks are lucrative for these cybercriminals.
ATM hacks continue to increase, in part due to targeted attacks and new ... Views: 1054
Whoever thought that one day, paying with green paper would be viewed as primitive as a horse and buggy? We seem to be getting closer to that time, especially since the security of making payments via smartphone is always being improved.
One way is with fingerprint scanning. Some smartphones ... Views: 1053
Many years ago when you were on vacation, before Facebook, Instagram and Twitter were invented (assuming you were an adult then), you had a great time, right? You weren’t “connected,” because there was no social media to be connected with.
If today you can’t imagine ... Views: 1053
Data Privacy Day was Wednesday, January 28, and these days the concept of “privacy” can be ambiguous, generic or confusing. What you might think of as private actually isn’t. The definition of personal identifying information, by the U.S. privacy law and information security, ... Views: 1050
Deadbolts aren’t hyped up; they really are superior to regular knob locks. Though we keep shaking our head in amazement whenever yet another news story comes out about a burglar or rapist who waltzed through an unlocked door and committed mayhem, it remains a hard fact that many criminals ... Views: 1048
A sharp nine-year-old girl has a biting message to a 51-year-old man, according to an article on myfoxboston.com:
“You deserve to stay in jail because you break into peoples houses. Stop breaking into peoples houses and do something with your life.”
This advice was directed to ... Views: 1047
Okay, what’s more likely? Getting bombed … or some punk racking up charges on your credit card?
The yearly Crime Poll says that two-thirds of the respondents were edgy about data breaches involving their credit cards, as well as their computer and smartphones getting ... Views: 1047
UL in this case stands for Underwriters Laboratories. An article on darkreading.com notes that a UL official, Maarten Bron, says that they are taking part in the U.S. government’s plan to promote security certification standards.
The U.S. government is interested in developing a UL-type ... Views: 1047
You may have been scammed after you responded to an e-mail that appears it came from Apple. When hackers send e-mails that appear to come from a legitimate company like Apple (or Google, Microsoft, PayPal, etc.), with the objective of tricking the recipient into typing in passwords, usernames, ... Views: 1046
Choosing a home security system may be dizzying, what with all the possibilities, but the good news is that there’s a system for every budget and personality.
Gone are the days in which the only security systems available were the ones with all the clunky wires that had to be put ... Views: 1046
As 2016 comes to an end, we look back at six of the year’s worst data breaches and what went wrong.
It seems like not a day went by this year without reports of yet another major data breach, or two or three data breaches. From healthcare to fast food to adult entertainment, no industry was ... Views: 1045
Your home should have multiple layers of protection. You’ve certainly heard that before. Motion detection is a critical layer of protection, and this is comprised of the simple act of unauthorized movement sensed as the result of breaking and entry. Glass break is similar in concept. One ... Views: 1044
Darkode anyone? Not anymore. This underground bad hackers’ forum was recently demolished by the FBI, says a report on www.justice.gov. The dozen hackers associated with Darkode are facing criminal charges.
Though there are about 800 of such forums, Darkode was among the worst (or shall ... Views: 1043
Is it Bank of America’s fault that a hospital was hacked and lost over a million dollars? Chelan County Hospital No. 1 certainly thinks so, reports an article on krebsonsecurity.com. In 2013, the payroll accounts of the Washington hospital were broken into via cyberspace.
Bank of ... Views: 1040
You can’t be too neurotic about shredding sensitive documents to smithereens. For example, some people make a career out of “dumpster diving,” digging through trash in search of bank account information, credit card preapprovals, medical bills, mortgage statements, etc., and ... Views: 1039
Some of us remember college dorm days, when students were envied if they had their own typewriter. These days, college students must have a personal laptop computer, and a smartphone, and their lives revolve around these connected devices. Such dependency should be proactively protected ... Views: 1038
Ever see those public bulletin boards with all the business cards on them? Don’t be surprised if you spot one that says “Hacker•for•Hire.” These are hackers who will, for a nice juicy fee, hack into your wife’s Facebook account to see if she’s cheating on ... Views: 1038
The recent Exactis data leak, which could surpass Equifax in the sheer number and scope of records exposed, has data privacy advocates calling for an “American GDPR.” While it is unlikely that a federal data privacy law will come to pass anytime soon, some states have already taken matters into ... Views: 1038
Hackers with big skills and a big ego will be drawn to Facebook and Twitter as their targets. But they’ll also target dozens of other companies, reports an article on arstechnica.com.
One group in particular stands out as the attackers, using zero-day exploits. They are known as Wild ... Views: 1038
So you think it’s really a far-out left-field idea: a burglar studying Facebook and other social media to select homes to rob. Well think again.
A survey, conducted by home security expert Friedland, found:
78 percent of burglars use social media to select targets.
74 percent touted ... Views: 1037
Cyber crooks have phony websites that masquerade as the legitimate site you want to log onto. They’ve spun their web and are just waiting for you to fly into it. Google now has Password Alert, which will tell you if you’ve landed into such a non-Google web.
For the Chrome browser, ... Views: 1037
If you are overseas somewhere and want to access your Facebook page…don’t be surprised if you can’t do this. In fact, you won’t even be able to get onto the Facebook site (or YouTube, for that matter), depending on what country that you are visiting. This is because some ... Views: 1036
Haste certainly doesn’t make waste if you’ve suffered from an entity getting hacked resulting in a data breach. Don’t waste a single minute delaying notifying affected accounts! In the case of a credit card company, they will investigate; you won’t have to pay the fraudulent charges. The ... Views: 1035
Part of my role as security guy is to keep tabs on the crime climate around the globe. Recently I kept seeing article after article about burglaries with one common theme: “door kicked in”. Don’t believe me? See below. But before you do, probably all of these could have been ... Views: 1035
We as Americans tend to have generous hearts and give freely when called upon during times of trouble. Many people donate money to charities online to help needy people with illnesses, animal activists and more. If you're one of those people, good for you! It 'an incredible thing that you can ... Views: 1035
Hackers and wannabe hackers can easily purchase cheap tools of the trade online. The security firm Dell SecureWorks Inc. confirms this in their latest report and adds that underground markets for hackers, including those from Russia, is thriving.
The “Dark Web” is the go-to place ... Views: 1032
Have you ever tried to take a picture or video of someone with your phone without them knowing? Sometimes it’s possible, but sometimes it’s not. Well, maybe you knew it was coming: “Ghost apps” are available that let you take images and videos without the target’s ... Views: 1031
Just as important as taking down the decorations, throwing out all the debris from opened gifts and getting the house back in order after the holiday activities, is that of scrutinizing your credit card statements.
Why? To make sure that all the purchases on there were made by you and only ... Views: 1030
Are you the owner of medical practice? One of your biggest sources of concern is sure to be the security of your health records. This is a vast mine of data that hackers, phishers, and cybercriminals of all types would love to get their hands on. It's more crucial than ever to keep these records ... Views: 1030
The Internet has almost as many videos as there are stars in the heavens. And you know that some have to be hoaxes. Sometimes it’s obvious, while other times it’s easy to be fooled. For example, the hoax of the “angel” intercepting a truck just about to run over a ... Views: 1030
Dark shadowy cloaked individuals tend to be the clichéd notion of most folks once the term phantom pops up. However phantoms who take your identity for his or her own gain can resemble anyone that you pass on the streets. But no, it's not a scary movie or a nightmare that vanishes but ... Views: 1030
Global losses from business email compromise scams, a highly sophisticated form of phishing, grew by 136% between December 2016 and May 2018 and now exceed $12 billion, according to a public service announcement released by the FBI.
What Is a Business Email Compromise Scam?
A business ... Views: 1027
A group of people who are actively collaborating to commit identity fraud is known as an identity fraud ring. These rings are generally made up of two or more career criminals, often including family members or close friends. These rings work by members either stealing a victim’s identity ... Views: 1027
In July, more than 15,000 security pros, hackers, hobbyists, and researchers met in Las Vegas for the Black Hat Conference 2017 at Mandalay Bay in Las Vegas. This was the 20th year that the security conference was held, and both black and white hat hackers joined together to discuss ... Views: 1025
First off, how NOT to fix a hacked credit report: signing on with a service that promises to correct the problem in a jiffy—a “sounds too good to be true” advertisement. A company that claims they will 100% fix your bad credit by removing negative information from your credit ... Views: 1024
Define Pwn: Pwn is a slang term derived from the verb own, as meaning to appropriate or to conquer to gain ownership. The term implies domination or humiliation of a rival. And when it’s done by hacking email, the person is effectively pwned. No matter how “private” you ... Views: 1024
Would you give up your bank account and credit card numbers to a stranger on the street after he approaches and asks for them? Of course not. But that’s essentially what people do when they’re tricked by online crooksters into revealing sensitive personal information, including their ... Views: 1024
Whenever I log onto my computer, visit a subscriber web sites or check my emails I always get the screen “Please enter your User Name and Password”. To manage this authentication barrage I might use the same logon information for all my sites, make the passwords simply to remember and keep the ... Views: 1024
You probably think you know what a “hacker” is, but the images portrayed in the media can be misleading. You may be thinking of a geeky-looking guy who causes peoples’ computers to get infected with viruses or cracks passwords to raid the accounts of big business. This is one ... Views: 1023
Think about your keychain. It probably holds the necessities: car keys, home keys, work keys, miscellaneous keychains you bought on your previous vacations. Now, imagine you have a keychain full of these keys that all look the same, but each only opens a specific door.
Sounds kind of like ... Views: 1022
Burglars get burgled, muggers get mugged, and hackers get hacked. This includes a sophisticated ring of hackers: Hacking Team, hailing from Italy, specializing in selling hacking software to major governments.
An article on wired.com describes how a “400 gigabyte trove” went ... Views: 1022
Burglars love doors; they frequently gain entry by kicking them down and even using less aggression to get into a house—and that includes simply opening the door because it’s not locked.
Don’t believe that if a burglar wants to rob you badly enough, he’ll figure out a ... Views: 1022
Yes, many thieves don’t have anything better to do than to follow delivery trucks around town to see what kind of bountiful packages they’ll be leaving at the doorsteps of homes. This means even more crooks simply drive around residential areas looking for boxes sitting outside of ... Views: 1022
Did you know that the original meaning of hacker, as far as computers, was that of a person who built codes into computers? In fact, the bad guy was called a “cracker.” Somehow, “cracker” didn’t catch on. But the mainstream folk out there hears “hacker,” ... Views: 1021
You just learned you have a new credit card account by checking your credit or because a bill collector called you. Problem is that you don’t remember ever applying for it. You must find out what’s behind this new account and how it got there.
Call the corresponding phone number ... Views: 1021
A recent controversial SuperBowl commercial from a major insurance company depicted a young boy who died as the result of numerous preventable household accidents such as poising and falls. The commercial got lots of traction via social media. Although it was presented tactfully, many people ... Views: 1021
The internet is a beautiful place. It is the way we communicate, the way we create, and the biggest business platform that has ever been generated. However, it is also a hazard, as anyone can put anything on it, and it’s extremely difficult to tell fact from fiction…especially if ... Views: 1020