With all the apps out there that individualize communication preferences among teens, such as limiting “sharing,” parents should still hold their breath. Face it, parents: times have changed. It’s your duty to discuss these applications with your kids. And parents should also ... Views: 807
There’s only one entrance to the house: a steel door two feet thick. If someone from the outside touched the door—even with a battering ram—they’ll get an electric shock. No bad guys could get through, right?
Well, suppose the bad guy tricks the homeowner into opening ... Views: 900
It’s tough being responsible sometimes. And managing responsibilities for what is precious in your life usually takes a little extra thought. Let’s say you’ve just welcomed a beautiful set of triplets into the world. Lucky you . . . and lots to managed! But, you ... Views: 885
Wow cool! A device that lets you know, via Internet, when your milk is beginning to sour! And a connected thermostat—turning the heat up remotely an hour before you get home to save money…and “smart” fitness monitors, baby monitors, watches…
Slow down. ... Views: 829
You’d think that it would be as easy as pie to avoid getting reeled in by a phishing scam. After all, all you need to do is avoid clicking on a link inside an email or text message. How easy is that?
A phishing scam is a message sent by a cybercriminal to get you to click ... Views: 989
Hackers bank heavily on tricking people into doing things that they shouldn’t: social engineering. A favorite social engineering ploy is the phishing e-mail.
How a hacker circumvents two-factor authentication:
First collects enough information on the victim to pull off the scam, such ... Views: 742
If you are like most of us, you have undoubtedly received an email that has asked you to click on a link. Did you click it? If you did, you are like 99% of internet users because clicking links in normal. But in some situations you may have found that the link took you to a new or maybe spoofed ... Views: 854
Phishing-type e-mails are designed to trick the recipient into either downloading a virus (which then gives the hacker remote control of the computer) or revealing enough information for the thief to open credit cards in the victim’s name, get into their bank account, etc.
There are ... Views: 776
You’re sitting on your front porch. You see a stranger walking towards your property. You have no idea whom he is. But he’s nicely dressed. He asks to come inside your house and look through your bank account records, view your checkbook routing number and account number, and jot ... Views: 926
A phishing e-mail is sent by a cyberthief to trick its recipient into revealing sensitive information so that the crook could steal money from the recipient or gain access to a business’s classified information. One way to lure an employee is for the crook to make the e-mail appear like it ... Views: 904
An impostor posed as Lorrie Cranor at a mobile phone store (in Ohio, nowhere near Cranor’s home) and obtained her number. She is the Federal Trade Commission’s chief technologist. Her impostor’s con netted two new iPhones (the priciest models—and the charges went to ... Views: 677
Pokémon Go has taken the world by storm, even though it is nothing more than a silly little game that people play on their mobile device. And it is not just child’s play, either. Plenty of adults are hooked on Pokémon Go—including college degreed professionals who ... Views: 833
To help keep your home and property safe from crime, the New Castle County Police Department provides the following guidelines:
Sounds like a no-brainer, but so many people do otherwise: Keep your doors locked at all times. People will actually go to sleep with the front door ... Views: 898
The police in Port St. Lucie Florida have claimed that scammers are now posting homes as available for rent or purchase. You rent/purchase the home by putting a deposit down on the house, but you’re never given any keys.
The scammers are getting their victims to the property and even a ... Views: 636
Your account passwords should be as unique as your fingerprint—to make them less hackable by crooks using password-guessing software that can run through millions of possible combinations in just minutes. And if you have an easy password, there may be a hit within 10 seconds.
Think ... Views: 781
When it comes to online security, don’t let your guard down just because the holiday shopping frenzy has passed. In fact, this may be the very time to put your guard up even higher.
Though it’s smart to have your radar on for the scammers during the holidays, the scammers ... Views: 922
In France, anything is possible. Like getting tossed in jail for posting your children’s photos on Facebook.
Yes indeed, it’s true. People in France might be put behind bars for putting their kids’ pictures on Facebook. Or, they may face heavy fines. This is because the ... Views: 760
As a parent, you may not be crazy about your child spending a lot of time “gaming.” Chances are good that your feelings are fueled by the fact that kids should play outside, be more social, and are getting addicted to tech or maybe the correlation between childhood obesity and excess ... Views: 751
Who’d ever think those silly little yellow circular faces and other such cyber symbols would become such a worldwide smash? I’m talking about emoticons, also known as emojis. Five years ago Apple put an emoji keyboard on its mobile devices. Six billion of these doggone things are ... Views: 884
Traveling is fun, exciting, tiring and depending on your destination, generally safe. But bad things can happen. The best thing you can do before you go, is prepare.
Safety Tips
Blend in on your vacation. Before you leave for your trip, plan out your arrival. Dress like the locals. ... Views: 819
Here’s one for the know-it-alls: Kids are 35 percent more likely to become victims of identity theft than are adults. Betcha didn’t know that! This startling news comes from a 2015 Javelin Strategy & Release study.
Needless to say, the bulk of parents aren’t on top ... Views: 804
What a disgrace: A private investigator, Eric Saldarriaga, 41, got nailed for hacking into peoples’ e-mails. He may get six months in the can. Is six months reasonable for this, though?
A recent online New York Times article quotes a prosecutor who points out that hackers could be ... Views: 906
Some people believe that monitoring your kids’ online activities crosses the line of privacy or trust. But monitoring and controlling online activities is, essentially, no different than controlling access to the cookie jar or TV or even locking a liquor cabinet.
Which brings me to a ... Views: 834
A recent controversial SuperBowl commercial from a major insurance company depicted a young boy who died as the result of numerous preventable household accidents such as poising and falls. The commercial got lots of traction via social media. Although it was presented tactfully, many people ... Views: 956
Are you thinking of getting a personal loan? Hopefully you have a high credit score, as this will give you a better chance of getting the loan through a legitimate company. But even if your credit is excellent, you need to be aware of the personal loan scams out there.
Not Respecting Your ... Views: 797
Social media is an excellent tool for small businesses, yet, the use of social media by small business staff can definitely put the company in danger. Many small business owners and managers don’t realize this.
Recently, I was talking to employees of a credit union about what to do in a ... Views: 712
You’re dreaming of a white Christmas, and hackers are dreaming of a green Christmas: your cash in their pockets. And hackers are everywhere, and are a particular threat to travelers.
Prior to leaving for your holiday vacation, have an IT specialist install a disk encryption on your ... Views: 1051
After Santa has gone back to the North Pole to take a long rest, don’t think for a second that burglars too will be resting in January.
True, the holidays are a prime time for many burglaries, knowing that underneath that gargantuan Christmas tree in the picture window is surely a pile ... Views: 906
When you go traveling, I’m sure you make a point to protect the various things you bring with you—including your laptop, children, even spouse. But what about something you left behind? Your home? Is that being protected too?
Before Leaving
Don’t wait till the ... Views: 795
Who has time to think about identity protection when planning a wedding? And why, for that matter? Well, there’s good reason: Marriage begets a change in identities. The months preceding the big day should be when the couple starts taking action to avoid identity theft.
If ... Views: 909
If you are like most of us, you probably have a password, antivirus program, and a firewall for your home computer to protect it from hackers. Are you doing the same thing for your phone?
From 2015 to 2016 malware infections on smartphones swelled by 96%, and about 71% of the smartphones out ... Views: 879
Yes, many thieves don’t have anything better to do than to follow delivery trucks around town to see what kind of bountiful packages they’ll be leaving at the doorsteps of homes. This means even more crooks simply drive around residential areas looking for boxes sitting outside of ... Views: 957
If you have an iOS device, you may be leaking personal information about yourself—without even knowing it—because you’re not familiar with the privacy settings.
Apps have “permissions,” meaning, they can access private information such as your social calendar ... Views: 787
It is September and it’s National Preparedness Month—a great time to get involved in the safety of your community. Make plans to stay safe, and this includes maintaining ongoing communications. National Preparedness Month culminates September 30th with National PrepareAthon! ... Views: 875
USPSID stands for U.S. Postal Service Informed Delivery. It is a good thing to sign up for because it informs you of your expected deliveries.
But there’s a problem: Someone ELSE could pose as you and sign up for this service, getting your mail before you have a chance to.
In fact, it ... Views: 635
So maybe Christmas now means the very predictable gift card swap, but hey, who can’t use a gift card? But beware, there are a ton of scams. This includes physical, not just digital, gift cards.
Regardless of who gave you the card, you should always practice security measures. Below are ... Views: 655
Even though the highly publicized retail data breaches have involved off-line brick and mortar stores, this doesn’t mean that security is high with online shopping. Scammers and hackers are waiting for you in more ways than you know, such as:
Fake product reviews
Non-existent ... Views: 807
$200 million: The amount people were ripped off by online dating scams in a year.
DUI: dating while under the influence…of the quest for love…is costly to countless people.
A nytimes.com article notes that this quest impairs judgment, making it easy for con artists to bilk ... Views: 785
Yes, it’s possible: preventing fraudsters from getting you via online trickery and other stealthy actions. Yes, it’s possible to be thinking one step ahead of cyber criminals. Let’s begin with e-mails—the conduit through which so many cyber crimes like ID theft ... Views: 920
Everyone has received very obvious “phishing” e-mails: Messages in your in-box that have outrageous subject lines like “Your Account Will Be Suspended,” or, “You Won!”
While some phishing attacks are obvious, others look harmless, such as those in a ... Views: 774
According to statistics, those who are 50-years old and older, like 65-85, are often targets of identity thieves. The bad guys have no issue taking advantage of your parents. They violate their trust, and understand that they are often naïve about the internet and scammy phone callls. Cyber ... Views: 703
Have you ever thought about how a data breach could affect you personally? What about your business? Either way, it can be devastating. Fortunately, there are ways that you can protect your personal or business data, and it’s easier than you think. Don’t assume that protecting ... Views: 749
With all the increased news coverage of kids running off with adults they met online, and kids dying by suicide supposedly due to online bullying, many parents are wondering if their worries about their kids being online are justified.
We hardly hear about how social media has benefited kids. ... Views: 801
If you looked at a photo of a baby boy, could you ever predict that he would grow up to become a sexual predator? Probably not. However, a study shows that men who commit sexual crimes are more likely to have something called an “anxious attachment” to their mothers due to feeling ... Views: 859
One bitcoin = $590.
If you’re sucked into a ransomware scam, you’ll likely be charged at least one bitcoin for the cyber key to unlock your computer’s files—that are being held hostage by hackers.
A report from Check Point Software Technologies and IntSights has ... Views: 756
Cyber criminals have been attempting to extort money from individuals and companies for many years, and the latest attempt to take advantage of others is by using Ransomware as a Service, or RaaS.
A ransomware virus infects a computer when a user clicks a link and unknowingly download a ... Views: 771
Yes, believe it or not, ransomware has become such a booming business for thieves, that these cyber thugs even provide bona fide customer service departments to guide their victims!
When ransomware infects your computer, it holds your files hostage; you can’t access them—until you ... Views: 682
It sounds almost like science fiction, even in this cyber age: A thief hacks into your computer and encrypts your files, meaning, scrambles the information so you can’t make sense of any of it. He demands you pay him a big fat payment to “unlock” the encryption or to give you ... Views: 945
Whoever said that fighting back at a rapist will probably create more problems for the victim might want to rethink this idea. How disabling can a bite to the rapist’s neck be when the biter is a human?
I mean, we’re not talking about a dog biting the man. When it comes to biting, ... Views: 767
Unfortunately, there is no such thing as a totally burglar-proof home, but there is also no burglar who can get into any home. By taking a few steps and using some specific security measures, you can make your home ALMOST burglar-proof.
When most homeowners consider security, they usually ... Views: 709