We are currently looking for an Official SelfGrowth.com Guide to "Identity Theft". If you have expertise in Identity Theft and your own website and/or product for this topic, please review this form for complete details. The Official Guide Position is part of our Premium Placement Package
Well, you know that old saying: The viciousness of an online bully’s attack is inversely proportional to the size of his (you fill in the blank), I was thinking ego.
Many online bullies are female, but in the case of former Red Sox pitcher Curt Schilling’s daughter, the trolls are ... Views: 901
It’s up to the potential victim—the user—YOU—to make your computer or smartphone very difficult for Joe Hackster to infiltrate.
Passwords
Being that cyber crime has been a fixture of modern living for over a decade, you’d think that everyone and his brother ... Views: 978
Why are so many burglaries hounding the town of Los Altos in California? There were 79 reported in 2013, but 118 for 2014. This past January and February there were 36. At that rate, by Christmas 2015, it’s unthinkable what the total number of burglaries will be.
In a report on ... Views: 903
“On the Internet, you can be ANYBODY!”
Not quite. Remaining anonymous in cyber space isn’t as easy as it used to be. Your browsing habits can be tracked, leading to your true identity. But there are things you can do to remain as anonymous as possible.
Don’t feel ... Views: 1583
You have a master password, from your password manager, for 28 accounts. Life has been so easy since!
But then you lose this master password. First off, you can’t fix this like you would if you forgot your password for PayPal or your credit card’s site. Plus, each password manager ... Views: 914
Have you ever had the chicken pox? This common childhood illness has another name—the varicella zoster virus. Like all viruses, varicella replicates itself, spreading though the body, and eventually appearing as itchy red blisters all over the body. But the virus doesn’t stop there; ... Views: 1064
Gee, it sounds like something out of one of those 1970s TV shows about government spies, but it’s reality: Plug this little thing into a wall socket and it records the keystrokes of a person nearby typing into a Microsoft wireless keyboard. The little gadget sends the information back to ... Views: 986
Spring is in the air (if you’re in the northern hemisphere) and it’s traditionally a time to clean every nook and cranny and get rid of excess stuff in your house. But it’s also a good time to clean up your digital life. Just like your house, your digital life needs a good ... Views: 1021
WARNING: Removing this video surveillance camera to kill evidence of your robbery will do you chickenfeed because the video of you is being stored in the cloud!
Today’s security systems are so much more evolved than they were 20 years ago, even 10 years ago.
We’ve all heard of ... Views: 902
What’s it called if, for example, someone runs up your credit card line without your permission? Identity theft. ID theft isn’t necessarily someone going around impersonating you. But it is considered someone taking over your accounts.
Account takeover is also someone hacking into ... Views: 1102
The IRS isn’t your biggest enemy during tax season. It’s the criminals who pretend to be IRS reps and then con people out of their money. They contact potential victims chiefly through phone calls and text messages.
Typically, the message is threatening in tone and/or content, ... Views: 903
Logins that require only a password are not secure. What if someone gets your password? They can log in, and the site won’t know it’s not you.
Think nobody could guess your 15-character password of mumbo-jumbo? It’s still possible: A keylogger or visual hacker could obtain ... Views: 913
Is it Bank of America’s fault that a hospital was hacked and lost over a million dollars? Chelan County Hospital No. 1 certainly thinks so, reports an article on krebsonsecurity.com. In 2013, the payroll accounts of the Washington hospital were broken into via cyberspace.
Bank of ... Views: 952
The Russians have come…again—in the form of hackers. Not long ago Russian cyber criminals busted into the U.S.’s State Department system and mangled it for months.
This time, they got into a computer system at the White House. Luckily, this system did not hold any ... Views: 922
“My house was hacked!” Had you said this 25 years ago, people would have thought a burglar vandalized it with an axe. Say it today and nearly everybody will know what you mean: A thief or prankster “broke” in to your house via its connected-to-the-Internet gadgets.
If ... Views: 914
Having a house run like the Jetsons’ is becoming increasingly possible: It’s called home automation. If you’re not familiar with the futuristic cartoon family, the Jetsons, just about everything in their house was automated. Today, we can have the following:
Sensors that ... Views: 992
Would you give up your bank account and credit card numbers to a stranger on the street after he approaches and asks for them? Of course not. But that’s essentially what people do when they’re tricked by online crooksters into revealing sensitive personal information, including their ... Views: 933
What if you knew there existed a possibility that some company, without your knowledge, grabbed a photo of your child and put it on their product and then put their product online for sale?
Koppie Koppie sells coffee mugs with photos of kids on them—and YOUR child could be one. Though ... Views: 1002
Billions and billions—it’s only a matter of time before this becomes the number of hacking incidents in a single year, because just in 2014, over one billion records were hacked out of 1,500 different hacking incidents, says a recent report.
Some other findings from the ... Views: 1145
At the start of the year, we all made our resolutions for 2015. Now it’s March—how are you doing on your resolutions? If you’ve already broken a few, no worries; New Year’s doesn’t have the monopoly on making goals to better yourself. This is especially true with ... Views: 1104
Spring is here (at least in some parts of the world in the northern hemisphere)! The bees are buzzing, the flowers are blooming, and the accountants are working late because for those in the U.S., it’s tax season! Scammers love tax season—there is a lot of money moving around as ... Views: 978
Whether you’re an animal person or not, you have to admit that puppies are pretty darn cute. So cute that there are YouTube Channels, Facebook accounts, and Buzzfeed newsletters devoted to the subject. Unfortunately, there’s a not so cute PUP out in the world, and it wants access to ... Views: 970
It’s easy to scam someone who did something wrong by telling them they need to fix their mistake. This is why thousands of people get scammed into paying back taxes to the IRS—the IRS has nothing to do with these scams, of course, but the predators prey on peoples’ fear of ... Views: 932
Give me a break! In the next month, students will get the week off for spring break—a much needed reward after months of hard work and, for some, gnarly winter weather. Spring break means free time, family vacations, trips with friends, and timeless memories.
But, spring break can pose ... Views: 1228
In the event of an attack, new smartphone applications can be used to send an alarm to a pre-chosen person. And the potential victims location can then be tracked.
But is this faster and more secure than a woman whipping out pepper spray and blasting a drunken buffoon who has her cornered in ... Views: 916
Ever see those public bulletin boards with all the business cards on them? Don’t be surprised if you spot one that says “Hacker•for•Hire.” These are hackers who will, for a nice juicy fee, hack into your wife’s Facebook account to see if she’s cheating on ... Views: 876
Ever see those public bulletin boards with all the business cards on them? Don’t be surprised if you spot one that says “Hacker•for•Hire.” These are hackers who will, for a nice juicy fee, hack into your wife’s Facebook account to see if she’s cheating on ... Views: 964
There’s only one entrance to the house: a steel door two feet thick. If someone from the outside touched the door—even with a battering ram—they’ll get an electric shock. No bad guys could get through, right?
Well, suppose the bad guy tricks the homeowner into opening ... Views: 889
Does your Lenovo computer have Superfish VisualDiscovery adware (a.k.a. spyware) installed? It’s possible if you purchased a Lenovo PC any time in September of 2014 and thereafter.
This Superfish software intercepts the Lenovo user’s traffic so that the user sees ads displayed ... Views: 1017
Just when you think it was safe to believe your Social Security number can’t get stolen…news breaks of the Anthem data breach. Over 80,000,000 patient records were compromised, including SSNs and home addresses. Like a meteor striking the earth, a disastrous ripple effect is ... Views: 882
These days, it is hard to pick up a newspaper or go online and not see a story about a recent data breach. No other example highlights the severity of these types of hacks than the Sony breach late last year.
While a lot of information, including creative materials, financials and even full ... Views: 1076
A recent controversial SuperBowl commercial from a major insurance company depicted a young boy who died as the result of numerous preventable household accidents such as poising and falls. The commercial got lots of traction via social media. Although it was presented tactfully, many people ... Views: 944
Does your wallet contain enough information about you for someone to steal your identity and commit crimes under your name? That’s what happened to Jessamyn Lovell when Erin Hart stole her wallet in 2011.
Hart shoplifted, checked into hotels and rented cars in Lovell’s name. Of all the ... Views: 835
If you’ve ever watched virtually any spy flick or James Bond movie you’re familiar with “bugs” – those little dime-sized metallic things that the bad guys would secretly stick under someone’s desk to record any conversation in the room—picked up by a ... Views: 938
Question: No. 1 reason people get a home security system?
Answer: Recently burglarized; The majority of the people I hear from who want to install a home security system were recently burglarized. It often takes adversity or even tragedy for us to wake up to the realities of a harsh ... Views: 925
It’s amazing how ingenious cybercriminals are, but the victims also need to take some responsibility for falling for these ruses, especially when the victim is a business that has failed to train its employees in cybersecurity measures.
Ransomware
The stuff of science fiction is here: ... Views: 1025
Sixty different materials go into the printing of a U.S. passport. That little booklet of a thing contains up to 30 pieces of security—and you can’t see most of them. And good luck trying to get details on these security features.
The author of an article on gizmodo.com points out ... Views: 872
Privacy used to mean changing clothes behind a partition. Nowadays, say “privacy” and people are likely to think in terms of cyberspace. Stay connected, and you risk losing your privacy.
Even if you’re not connected, don’t even own a computer or smartphone, information ... Views: 932
The old TV show “Star Trek” has and episode where Spock is telling Kirk of a human flaw called intuition. Spock was all about analysis and logic, while Kirk often relied upon intuition to solve problems. Intuition is a complex human sense that isn’t entirely understood or even ... Views: 910
I know someone who tried to make a hotel reservation over the phone. She goes by the name “Kelcie,” but her birth name is Frances. She hates her birth name. When making the reservation she used the name Kelcie, which is what’s on her credit card and checks, but her ... Views: 1072
Who needs guns, threatening notes to rob a bank when you can do it with just your fingertips inside your home?
A hacking ring in the eastern portion of Europe may be the most successful team of bank robbers to date, having purportedly robbed $1 billion from multiple banks. This can only be ... Views: 925
What is catphishing? It certainly isn’t Garfield lazily sitting in a canoe holding a fishing rod. Catphishing is when a fraudster fabricates an identity and tricks someone via cyber communication into a phony emotional or romantic relationship—usually for financial gain to the ... Views: 1048
It’s been said that there are over a million different apps for the smartphone. Well, however many may exist, know that not all of them are passing security tests with flying colors.
You may already be a user of at least several of the 25 most downloaded apps And what’s so special ... Views: 986
You wouldn’t have to worry about privacy issues on Facebook if you didn’t post sensitive, private information on Facebook…such as information that one day can be used against you. And really, you should share only what you consider “professional” information, even ... Views: 1029
One of the arguments against being very virtually social is that nobody is SO important that everyone wants to know, for instance, that this person is going to be at the local sports bar watching the Super Bowl (or almost nobody; sad to say, some celebrities have half the world following ... Views: 877
Who’d ever think that 50 years ago, your money was safer in your bank account than it is today in this “modern” age: remote theft. If you bank with a large or small bank, your account may be at risk by hacking rings.
However, most of the time, but not always, if your account ... Views: 890
Data Privacy Day was Wednesday, January 28, and these days the concept of “privacy” can be ambiguous, generic or confusing. What you might think of as private actually isn’t. The definition of personal identifying information, by the U.S. privacy law and information security, ... Views: 961
Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I smell a rat. Literally, a RAT.
A RAT or remote administration tool, is software that gives a person full control a tech device, remotely. The RAT gives the user access to your ... Views: 1048
Crimes against women are often “crimes of opportunity”. The predator doesn’t care if the opportunity presents itself in a major bustling city or in a tiny town with a population of only 400. If he sees prey and nobody else is around, he’ll strike—big town, medium town or small ... Views: 892
Home burglaries don’t just happen in the big cities that everyone’s heard of. They can also occur in small towns—simply because the burglar lives in them or in neighboring areas. Such is the case with Kirksville, Missouri.
A recent report from heartlandconnection.com tells of ... Views: 855