We are currently looking for an Official SelfGrowth.com Guide to "Identity Theft". If you have expertise in Identity Theft and your own website and/or product for this topic, please review this form for complete details. The Official Guide Position is part of our Premium Placement Package
One of the biggest threats that taxpayers are facing these days is an aggressive scam where criminals call victims and pretend to be IRS agents. The goal? To steal money.
All year but especially during tax filing season, the IRS will see a big surge in the number of scam calls, which tell ... Views: 832
It’s been said that nobody can make you feel bad about yourself without your permission. Well bah! Some people don’t wait for your permission to denigrate you. They are toxic. Lifehacker.com offers some ways to deal with such people.
Love Yourself
If someone’s words have ... Views: 830
Companies that cut corners by giving cybersecurity training only to their technical staff and the “big wigs” are throwing out the welcome mat to hackers. Cyber criminals know that the ripe fruit to pick is a company’s sales staff. Often, the sales personnel are clueless about ... Views: 830
Often, hucksters prey on the consumer’s desperation, which is why it’s no surprise that the No. 1 rip-off (at least between 2011 and 2012)) was bogus products promising weight loss.
VICE (vice.com) interviewed psychologist Maria Konnikova about how cyber cons are so ... Views: 830
Social Security numbers and credit card numbers are not the only types of data that hackers are after. Now, they are looking at frequent flyer accounts, and they are stealing reward miles, and then selling them online.
How do Hackers Steal Frequent Flyer Miles?
As with other types of ID ... Views: 829
You might be surprised to know that more than 3.4 billion fake emails are sent around the globe each day. What does this mean? It means that almost every company out there is vulnerable to cybercrimes in the form of “spoofing” and “phishing.” On top of this, most ... Views: 828
Mass shootings. They happen so often these days, they are hardly making headlines, and when they do, they are soon pushed out of the news cycle thanks to what’s going on in the White House or in Russia. There are many red flags that show what crazy mass shooters look like.
Look at ... Views: 828
If you want to get an idea of how safe or crime-ridden a town may be, do some casual observing including at night:
Are women walking or jogging alone at night?
Are people hanging out in the evening having a good time?
Are children mysteriously absent on a sunny weekend afternoon?
Are ... Views: 828
Just like older generations never thought that the dial phone in the kitchen could be dangerous (think phone scams), today’s kids don’t have a clue how hazardous smartphone apps can really be. They are a godsend to pedophiles, scammers and hackers. And let’s not forget other ... Views: 827
The words “spying” and “stalking” have negative connotations, but there’s a flipside to the coin: parents monitoring their kids’ online activities and physical locations. And how about middle-aged adults keeping track of the whereabouts of their aged parents ... Views: 827
Don’t let the idea of reinforcing your house’s doors intimidate you. Here is step by step instruction on installing new stronger locks.
Your House’s Door Parts Inventory
Any door without a deadbolt gets a deadbolt, which should be a grade 1 or 2.
Are the screws of any ... Views: 827
You’ve probably read many times that two-factor authentication is a superb extra layer of protection against a thief hacking into your accounts, because gaining access requires entering a One Time Passcode (OTP)—sent via text or voice—into a login field. In other words, no ... Views: 826
It doesn’t matter who you are or where you live, your home is at risk of being burglarized. According to numerous studies, in the US alone, a burglary occurs about once every 18 seconds, which equates to about 5,000 a day.
Fortunately, you can secure your home or business against ... Views: 826
Well, we certainly can’t blame Dennis Nicholl for breaking the law. Frankly, had I been nearby him when he did it, I would have kept silent and let him continue breaking the law—unless, of course, I was engaged in some loud, planet-moving discussion with a world leader.
Nicholl, ... Views: 826
Latest FINRA Examination Findings Reveal That Firms Have Made Progress with Cyber Security, but Problems Remain
Cyber security remains “one of the principal operational risks facing broker-dealers,” according to FINRA’s 2017 Examination Findings Report, and while progress has been made, many ... Views: 825
Studies across the board indicate that weak usernames and passwords are one of the top causes of data breaches, and I find that information to be unfortunate, because it is preventable. According to a recently concluded survey conducted by uSamp and sponsored by Siber Systems, creators of ... Views: 825
Gone is the day when, while out on a romantic evening with your special someone, you suddenly realize you forgot to turn on your house alarm. You spend the rest of the long evening fretting about this.
Nowadays, all you need do is whip out your smartphone and activate the alarm. You can even ... Views: 824
How dumb can air travelers be, trying to get guns past the TSA? Duhh, don’t they know that the X-ray equipment or pat-downs will detect them? Just last year, over 2,600 guns were detected. More than 80 percent of these guns were loaded. Talk about the world’s dumbest criminals.
It ... Views: 824
Using a knife in a survival situation is a skill that can mean the difference between life and death. But, you have to know how to use the knife. Here is some information:
Knife Safety:
Carry a fixed-blade knife if you are going outdoors. It is less likely to get broken
Always keep a ... Views: 823
We live in a time where you can track a car, a driver and even speed by using GPS tracking. This is a technology that is in huge demand, and it is not just because of higher rates of theft; but also due to technological advances and frankly, people “just want to know”.
FBI reports ... Views: 823
Trick e-mail = fraudulent wire transfer = hundreds of thousands to millions of dollars stolen.
That’s what’s happening with business executives in select industries (e.g., chemical operations, manufacturing), says a report at threatpost.com, citing a finding from Dell ... Views: 822
The season of giving is now upon us — but don’t forget, it’s also the season of stealing — and no, I don’t mean your wallet or the gift package at your doorstep, but your Social Security number, credit card information, medical records and any other highly ... Views: 822
You shouldn’t leave any digital trace of yourself after you leave a job. Hopefully, you’ll be leaving voluntarily and thus have the time to first make backups before you delete anything. This may seem easy, but you need to take inventory to make sure you get EVERYTHING.
Note: make ... Views: 821
Traveling is fun, exciting, tiring and depending on your destination, generally safe. But bad things can happen. The best thing you can do before you go, is prepare.
Safety Tips
Blend in on your vacation. Before you leave for your trip, plan out your arrival. Dress like the locals. ... Views: 821
Imagine that you are in the middle of nowhere for a few days, or that you are stuck in your home after a disaster, like a hurricane. What do you need to survive? Here are several things that you should have available. Remember, this is only a basic list; things that you might pack in a “go ... Views: 821
A shocking study by the National Associated for Information Destruction has revealed some terrifying information: 40% of electronic devices found on the second-hand market contains personal information. This information includes usernames and passwords, personal information, credit card numbers, ... Views: 820
If the super big wigs could get their social media accounts hacked, you can too. If you can believe it, the Twitter accounts of the following were recently hacked:
Google CEO Sundar Pichai
Yahoo CEO Marissa Mayer
Oculus CEO Brendan Iribe
Twitter co-founder Jack Dorsey
Shouldn’t ... Views: 820
A crook can steal your identity by taking control of your wireless phone account—by pretending to be you in person at the mobile store. The villain can then buy pricey mobiles and sell them—and guess who gets the bill but not the profit.
Symptoms of Hijacked Account
Suddenly ... Views: 820
Leave personal details off your Facebook page.
Does the whole world—or even your private circle, many of whom you haven’t seen in person for years, or even at all—have to know you’re laid up from hernia surgery (i.e., vulnerable, defenseless)?
Try this experiment for ... Views: 820
If you’re a pedophile, you’d be wise not to keep any prescription containers in view of a webcam with your lewd pictures. The information on such a bottle is what helped pedophile Stephen Keating get 110 years in the slammer says a CNN article.
But the amazing thing is that the ... Views: 819
If you’ve heard this once, you need to hear it again—and again: Never use the same password and username for more than one account!
If this got Mark Zuckerberg’s (Facebook’s chief executive). Twitter account hacked, it can get just about anybody hacked.
A report at ... Views: 819
The iPhone has a vulnerability called the Signaling System 7 (SS7) that allows crooks to hack into the device.
This was demonstrated on a recent “60 Minutes” episode in which a U.S. congressman (with his permission) had his iPhone hacked by German cybersecurity experts. The ... Views: 819
You might think it’s crazy to actually hire a hacker, but if you don’t have an ethical hacker on your security team, you could be playing a dangerous game.
Ethical hackers are called “white hat hackers” and are legal hackers, that help businesses find security problems ... Views: 818
Before embarking on a road trip with a car full of kids, make sure everything about the vehicle is in top working condition, including the windshield wipers, A/C, heat, fluid levels, seatbelts and lights (exterior and interior).
Hopefully you’ll have a GPS; make sure that works, too; ... Views: 818
You have undoubtedly seen tips for protecting your home, but you might not have seen them all. In no particular order, here are 40 tips that you can use today to keep professional burglars from targeting your home and keep safe from hazards:
Install a peephole.
Keep your doors locked ... Views: 817
Disasters happen every day. Crashing hard drives, failing storage devices and even burglaries could have a significant negative impact on your business, especially if that data is lost forever. You can avoid these problems by backing up your data.
Backing up means keeping copies of your ... Views: 817
Roy Chattelle was on a road trip in 2008 and suffered what seemed like a minor tire leak. So he got the tire repaired. Many people think nothing of pulling into the nearest tire shop and getting that little puncture or tear repaired or “plugged.”
A few months after this routine ... Views: 815
Malevolent advertising is called malvertising. The “ad” is placed on a website by cybercriminals who want control of your computer for financial gain.
And the real scary thing about malvertising is that these trick-ads have appeared on trusted, popular websites like the Weather ... Views: 815
Ever wonder how a motion detector works? How can some inanimate object “know” you’re creeping nearby, even if you’re as quiet as a mouse? This amazing technology can be broken down into several types.
Active Ultrasonic
When an object moves, it can bounce back ... Views: 814
A man was assaulted by three or four men when he arrived home, through his garage door at 5:40 a.m. It’s very apparent that the attackers knew he’d be arriving home at around this time and decided to wait for him, says a report at ksla.com.
This recent home invasion occurred in ... Views: 814
Who needs a hanger to steal a car when you can use a laptop? Despite today’s vehicles having far more sophisticated security protection, thieves can still break in—like the two crooks who stole at least 30 Dodge and Jeep vehicles…with just a laptop computer.
In Houston, ... Views: 814
Approximately 885 million digital documents have been exposed from mortgage deals that date back to 2003. First American Financial Corp is a provider of title insurance, as well as other services for the mortgage and real estate industries, and it allowed millions of records to be exposed ... Views: 812
Though you cannot totally protect your home from getting burgled, you would probably be surprised to know that there are no burglars that are as sophisticated as someone like Ethan Hunt from the Mission Impossible movies. However, when you have the right plan in place, you can almost make your ... Views: 812
You don’t have to be wealthy or live in a big house to need a home security safe. If you don’t think you need one, ask yourself why. Ask yourself if you don’t have any valuables—not necessarily something that would be valuable to a burglar, but something very dear and ... Views: 812
Hackers can take over someone’s life in a matter of hours. Just ask Patsy Walsh.
Though she is not a tech savvy person, the grandmother of six did have a Facebook account, and that was all the hackers needed to take over her life. By using methods such as click baiting, the act of ... Views: 811
If you have made the decision to use a password manager for your personal cybersecurity, which I highly recommend, you will quickly find that you online world is safer, easier and more secure than ever before.
According to a recently concluded survey conducted by uSamp and sponsored by Siber ... Views: 811
Someone else might file your taxes if you don’t get to it. And they won’t be doing it as a favor; they’ll be doing it to steal your identity.
Here’s how it works:
Cyber thieves send fraudulent e-mails to a business’s employees.
The e-mails are designed to ... Views: 811
You might have heard about all of the scams out there, and think that you are pretty scam savvy. But, the truth is, most of us aren’t, and even a simple phone call could get you caught up in a big scam.
One such scam occurs when criminals call random phone numbers and ask questions, ... Views: 810
With all the apps out there that individualize communication preferences among teens, such as limiting “sharing,” parents should still hold their breath. Face it, parents: times have changed. It’s your duty to discuss these applications with your kids. And parents should also ... Views: 810
For more than four years, malware has been posing as legitimate software and infecting industrial equipment across the globe.
The malware, which looks just like the Siemens control gear software, has affected at least seven plants in the US. According to security experts, the malware was ... Views: 809