The iPhone has a vulnerability called the Signaling System 7 (SS7) that allows crooks to hack into the device.
This was demonstrated on a recent “60 Minutes” episode in which a U.S. congressman (with his permission) had his iPhone hacked by German cybersecurity experts. The ... Views: 815
You have undoubtedly seen tips for protecting your home, but you might not have seen them all. In no particular order, here are 40 tips that you can use today to keep professional burglars from targeting your home and keep safe from hazards:
Install a peephole.
Keep your doors locked ... Views: 814
Disasters happen every day. Crashing hard drives, failing storage devices and even burglaries could have a significant negative impact on your business, especially if that data is lost forever. You can avoid these problems by backing up your data.
Backing up means keeping copies of your ... Views: 814
Roy Chattelle was on a road trip in 2008 and suffered what seemed like a minor tire leak. So he got the tire repaired. Many people think nothing of pulling into the nearest tire shop and getting that little puncture or tear repaired or “plugged.”
A few months after this routine ... Views: 813
Before embarking on a road trip with a car full of kids, make sure everything about the vehicle is in top working condition, including the windshield wipers, A/C, heat, fluid levels, seatbelts and lights (exterior and interior).
Hopefully you’ll have a GPS; make sure that works, too; ... Views: 813
A man was assaulted by three or four men when he arrived home, through his garage door at 5:40 a.m. It’s very apparent that the attackers knew he’d be arriving home at around this time and decided to wait for him, says a report at ksla.com.
This recent home invasion occurred in ... Views: 812
Ever wonder how a motion detector works? How can some inanimate object “know” you’re creeping nearby, even if you’re as quiet as a mouse? This amazing technology can be broken down into several types.
Active Ultrasonic
When an object moves, it can bounce back ... Views: 811
Malevolent advertising is called malvertising. The “ad” is placed on a website by cybercriminals who want control of your computer for financial gain.
And the real scary thing about malvertising is that these trick-ads have appeared on trusted, popular websites like the Weather ... Views: 811
Though you cannot totally protect your home from getting burgled, you would probably be surprised to know that there are no burglars that are as sophisticated as someone like Ethan Hunt from the Mission Impossible movies. However, when you have the right plan in place, you can almost make your ... Views: 810
Who needs a hanger to steal a car when you can use a laptop? Despite today’s vehicles having far more sophisticated security protection, thieves can still break in—like the two crooks who stole at least 30 Dodge and Jeep vehicles…with just a laptop computer.
In Houston, ... Views: 810
Approximately 885 million digital documents have been exposed from mortgage deals that date back to 2003. First American Financial Corp is a provider of title insurance, as well as other services for the mortgage and real estate industries, and it allowed millions of records to be exposed ... Views: 809
Hackers can take over someone’s life in a matter of hours. Just ask Patsy Walsh.
Though she is not a tech savvy person, the grandmother of six did have a Facebook account, and that was all the hackers needed to take over her life. By using methods such as click baiting, the act of ... Views: 809
If you have made the decision to use a password manager for your personal cybersecurity, which I highly recommend, you will quickly find that you online world is safer, easier and more secure than ever before.
According to a recently concluded survey conducted by uSamp and sponsored by Siber ... Views: 809
You don’t have to be wealthy or live in a big house to need a home security safe. If you don’t think you need one, ask yourself why. Ask yourself if you don’t have any valuables—not necessarily something that would be valuable to a burglar, but something very dear and ... Views: 809
Someone else might file your taxes if you don’t get to it. And they won’t be doing it as a favor; they’ll be doing it to steal your identity.
Here’s how it works:
Cyber thieves send fraudulent e-mails to a business’s employees.
The e-mails are designed to ... Views: 808
You might have heard about all of the scams out there, and think that you are pretty scam savvy. But, the truth is, most of us aren’t, and even a simple phone call could get you caught up in a big scam.
One such scam occurs when criminals call random phone numbers and ask questions, ... Views: 807
For more than four years, malware has been posing as legitimate software and infecting industrial equipment across the globe.
The malware, which looks just like the Siemens control gear software, has affected at least seven plants in the US. According to security experts, the malware was ... Views: 807
With all the apps out there that individualize communication preferences among teens, such as limiting “sharing,” parents should still hold their breath. Face it, parents: times have changed. It’s your duty to discuss these applications with your kids. And parents should also ... Views: 807
Even though the highly publicized retail data breaches have involved off-line brick and mortar stores, this doesn’t mean that security is high with online shopping. Scammers and hackers are waiting for you in more ways than you know, such as:
Fake product reviews
Non-existent ... Views: 807
If you were to design the ultimate security system for a house, what would you focus on? These days, many people would immediately think in terms of the most technologically advanced alarm system—one that’s voice activated, detects motion anywhere, can be remotely controlled and ... Views: 805
Here’s one for the know-it-alls: Kids are 35 percent more likely to become victims of identity theft than are adults. Betcha didn’t know that! This startling news comes from a 2015 Javelin Strategy & Release study.
Needless to say, the bulk of parents aren’t on top ... Views: 804
If all a gunman, who opened fire and randomly killed nine people, wanted was 15 minutes of fame, he could have achieved this running naked into the field at a major league baseball game.
At least one criminologist believes that the driving force behind mass shootings is a desire for celebrity ... Views: 803
Be honest. Do you have a key to your house under your doormat or a flowerpot? If you do, you might as well put a sign out that says “Come rob me.” This isn’t to say you shouldn’t have a key somewhere, though. After all, you might need it one of these days. However, there ... Views: 802
This week I worked with Gemalto, as part of Gemalto’s #ChipAwayAtFraud campaign. I was tasked with using my “chip” card when making a bunch of every day purchases like getting coffee and shopping. Gemalto, one of the world’s leaders in digital security, wanted a ... Views: 802
YouTube uses a recommendation algorithm to help people view things they’d like to see. Recently, the algorithm seemingly encouraged pedophiles (YouTube would have no way of knowing this) to watch videos of children playing at home, videos that the family members uploaded.
A report from ... Views: 802
In 2015, depending on the kind and type of identity theft we are talking about, identity thieves impacted 1.5 million people or more, says the Javelin Strategy & Research report. That’s more than double than for 2014.
The move from stripe cards to chip cards has motivated crooks to ... Views: 801
With all the increased news coverage of kids running off with adults they met online, and kids dying by suicide supposedly due to online bullying, many parents are wondering if their worries about their kids being online are justified.
We hardly hear about how social media has benefited kids. ... Views: 801
This post isn’t exactly a “how to” but if your current employment isn’t bringing in the bacon, I’m sure your criminal mind can figure it out. In the biggest digital advertising fraud in the history of the U.S., it was recently found that a group of hackers is ... Views: 800
According to a new study, genetics and evolution have made an impact on the murderous behavior of the human species. However, becoming civilized has tamed some of these instincts.
Scientists have looked at the homicide rate of more than 1,000 species that kill their own, and noticed that ... Views: 800
If you employ remote workers, your IT staff has a unique challenge keeping your organization safe. Fortunately, using a combination of best practices for cybersecurity, user awareness campaigns, and a strong policy will help to keep data safe.
New advances in mobile technology and networking ... Views: 797
You may be putting your company at risk simply by hiring a new employee. Why? Because that person could have a hidden, malicious agenda.
This is known as an inside threat, and it means that someone within your organization is planning or conducting activities meant to harm the company.
There ... Views: 797
Are you thinking of getting a personal loan? Hopefully you have a high credit score, as this will give you a better chance of getting the loan through a legitimate company. But even if your credit is excellent, you need to be aware of the personal loan scams out there.
Not Respecting Your ... Views: 797
If your computer password contains the name of your dog, your favorite vacation spot, and an easy-to-remember numerical sequence, then you are breaking some basic rules of password safety. Even though “BusterBermuda789” might seem impenetrable to you, this is a password security ... Views: 797
If you are thinking of jumping onto the Bitcoin bandwagon, or any type of cryptocurrency, you have to make sure that you are watching out for scams. There are a ton of them out there, including the following:
Fake Bitcoin Exchanges
You have to use a Bitcoin exchange if you want to buy or ... Views: 796
If you’re ever confronted by an assailant in your garage, you may have any number of highly effective weapons within your reach. A woman in Indianapolis identified as Carol found that out soon enough when she arrived home in February of 2016.
A man was waiting in her garage. The ... Views: 796
When you go traveling, I’m sure you make a point to protect the various things you bring with you—including your laptop, children, even spouse. But what about something you left behind? Your home? Is that being protected too?
Before Leaving
Don’t wait till the ... Views: 795
Criminals often rely on tricking their victims to gain access to their passwords and other account information. This act of tricking is called social engineering, also known as a confidence crime, and it comes in many forms.
A type of phishing e-mail where the criminal targets someone ... Views: 793
Before buying a security camera, ask yourself:
Where do you intend on placing it?
How well-hidden can/will the unit be?
Are you familiar with laws pertaining to surveillance of people without them knowing about it and the associated audio recordings?
Laws vary from state to state ... Views: 792
How many times have you read, or at least caught a headline, of the latest high profile missing child case? How many stories have we heard about the kid who got lost on a hike? His body was found several miles from where he’d been last seen, concluding a several-day search.
What if he ... Views: 791
How prepared are you for a disaster? Most of us are not prepared, at all, yet two-thirds of us live in an area where we are at a moderate to very high risk of experiencing a natural disaster. Here are a few things you should do, today, to start preparing for a “just in case” ... Views: 791
If you use Gmail, pay attention! Security experts have announced that there is a very effective phishing scam out there, and you are a target. This scam, which has only been growing over the past couple of months, is also hitting other email providers, too. However, it’s quite difficult to ... Views: 791
Two thousand credit card payment terminals stand to become infected with malware called Trinity point of sales.
Ten million credit cards were stolen by hackers, called Fin6, who may end up scoring $400 million. The cards were stolen from retail and hospitality businesses. If each card sells ... Views: 790
April Marchessault got attacked just after midnight inside her bathroom. At 5-1, she wasn’t intimidated by the 5-7, 200 pound man. Edgardo Montes, 47, got his clock thoroughly cleaned.
He was charged with breaking and entering and intent to rape, plus other charges. It all began when ... Views: 790
If you are like me, you have several online accounts, each with a user name and password. Though it is tempting to use one password for every account, this can be troublesome as it is a huge security risk. So, what is your only option? To use a password manager.
According to a recently ... Views: 790
Stop clicking on e-mails about your package delivery! Scam, scam, scam! Look, it’s simple:
Scammers are also pretending to be from the DHL and FedEx shipping companies, not just UPS.
Crooks know that at any given time, thousands and thousands of U.S. people are waiting for a package ... Views: 790
Yes, believe it or not, you CAN get by in life with a wallet that just has a little cash, a store card or two, one to two credit cards and your ID. Unless you absolutely need your insurance card or Social Security card, leave those items at home.
For years now, wallets have been on the market ... Views: 790
Frankly, naked babies shouldn’t be a big deal. If you don’t have naked baby pictures of your kids in the kitchen sink then you aren’t human. BUT….the world has changed. If you compare posting your children’s photos online with whipping out a wallet photo of your ... Views: 788
If you have an iOS device, you may be leaking personal information about yourself—without even knowing it—because you’re not familiar with the privacy settings.
Apps have “permissions,” meaning, they can access private information such as your social calendar ... Views: 787
Even if you don’t realize it, your identity is all over the internet. Whether you posted to an internet forum in 1996 or you ever had a MySpace page, this information is still out there, and you have to protect it. Here are some simple and easy ways that you can protect your digital ... Views: 787
Do you ever use the same password over and over again for different accounts? If so, you are not alone. However, this is quite dangerous. It’s best to use a different, unique password for each account, and to make it easier, you should use a password manager.
According to surveys, ... Views: 787