You can’t change your fingerprint like you can change your password. But why would you want to change your fingerprint? The thought might cross your mind if your fingerprint gets stolen.
How the heck can this happen? Ask Starbug. He’s a hacker who demonstrated just how this could ... Views: 1028
Spring is in the air (if you’re in the northern hemisphere) and it’s traditionally a time to clean every nook and cranny and get rid of excess stuff in your house. But it’s also a good time to clean up your digital life. Just like your house, your digital life needs a good ... Views: 1026
Ever hear of a crime called skimming? It may not be as dramatic a crime as assault or Ponzi schemes, but it can cause significant problems to you as your savings account can be wiped out in a flash.
Picture a scrawny nerd tampering with an automated teller machine (ATM)—the ... Views: 1026
Not too long ago, the office computer filled an entire room. Now, it fills the palms of one-third of employees—those workers who use only the mobile device for their jobs. Security, however, lags behind in keeping up with this growing trend. This is the BYOD generation: bring your own ... Views: 1023
Does your Lenovo computer have Superfish VisualDiscovery adware (a.k.a. spyware) installed? It’s possible if you purchased a Lenovo PC any time in September of 2014 and thereafter.
This Superfish software intercepts the Lenovo user’s traffic so that the user sees ads displayed ... Views: 1022
If you think there’s like a million apps out there, that’s not exactly an exaggeration. For sure, there are more than you can imagine, which makes it easy to conceive that many certainly come with security problems.
In fact, out of the top 25 most popular apps, 18 of them bombed on a security ... Views: 1022
There are numerous subspecialties within the booming cybersecurity field[i]. Here are some of the most in-demand professions:
Cybersecurity Engineer: This is the all-around, jack-of-all-trades, go-to guy or gal of cybersecurity. For all intents and purposes, a cybersecurity engineer is a ... Views: 1018
If someone is “borrowing” your Wi-Fi service, there’s more to this than just the nerve of someone secretly mooching off of you.
Their use of your service could interfere with bandwidth and mess up your connection. If they’re a bad guy hacker or even a skeevy child porn ... Views: 1017
One difference between a credit card and a debit card is that if there’s an unauthorized charge on your credit card, you just get a little sting. It’s a hassle to straighten out. But no money is taken from you.
But if someone gets ahold of your debit card information, the second ... Views: 1016
“Anonymous” is an activist hacking group that has recently boasted that it will engage in 30 days of cyber assaults against “all central banks,” reports an article on cnbc.com.
And their bite is as big as their bark, as this announcement came soon after several major ... Views: 1015
So, when you think about summer travel safety, what comes to mind? Which beach you’ll be lounging on? Sunburns? Shark attacks? While sunburns and vacation plans are rational concerns most have when traveling during the summer, shark attacks are a new one.
With all of the news of recent ... Views: 1011
You’ll probably be shocked to learn that last year, thousands of cars with keyless entry technology were stolen in London, says a report from wired.com.
But fact is, the more connected a vehicle is to the cyber world, the more hackable the vehicle is—and the hack could be to steal ... Views: 1007
What if you knew there existed a possibility that some company, without your knowledge, grabbed a photo of your child and put it on their product and then put their product online for sale?
Koppie Koppie sells coffee mugs with photos of kids on them—and YOUR child could be one. Though ... Views: 1007
Perhaps someone has told you that you need to “clear your cache,” but what does this mean and why should you do it? A cache is a folder of recently visited webpages, which is stored on your computer’s hard drive, and maintained by your Internet browser.
The purpose of a ... Views: 1007
It’s called Chameleon—a computer virus—but maybe it should be called FrankenVirus. You wouldn’t believe what it can do: literally move through the air, as in airborne—like a biological pathogen.
And like some Franken-creation, it came from a laboratory, ... Views: 1006
How safe do you really think your home is?
Lock the doors. This no-brainer doesn’t just mean when you’re gone all evening. It means during the daytime when you’re home. There’s no reason for doors to be unlocked when you’re inside the house. Does your lock ... Views: 1004
There are enough tips on how to protect your home to make a professional burglar dizzy. In no particular order, check them out:
Get a peephole.
If you don’t have a large dog, make it look like you do, but don’t be obvious. A worn, large leash draped over an outdoor chair would ... Views: 1003
What’s one billion? That’s about the number of possible permutations of the Social Security number. Which begs the question: What happens to an SSN when someone kicks the bucket?
Currently, SSN’s are never repeated when they’re issued by the Social Security ... Views: 1002
The FBI says that in the U.S., one out of every 36 homes will be raided by thieves in any given year. Often, the burglars were able to get in due to the residents’ carelessness.
Unlike the movies, in which burglars are hiding in the shrubs at night waiting for the homeowner to return ... Views: 1001
Unfortunately, cyberbullying is prevalent, and a growing threat in today’s always-connected world. Cyberbullying refers to bullying done via computers, or similar technologies, such as cell phones. This kind of bullying usually includes mean or threatening comments, or public posts through ... Views: 999
So someone comes up to you in a restaurant—a complete stranger—and asks to look at your driver’s license. What do you do? Show it to that person? You’d have to be one loony tune to do that.
However, this same blindness to security occurs all the time when a person is ... Views: 999
Having a house run like the Jetsons’ is becoming increasingly possible: It’s called home automation. If you’re not familiar with the futuristic cartoon family, the Jetsons, just about everything in their house was automated. Today, we can have the following:
Sensors that ... Views: 997
One in four (25 percent) of college women reported they received unsolicited sexual contact while in college, says the recent Association of American Universities Campus Climate Survey of 150,000 students.
How can on-campus safety be heightened?
Students should have a hardcopy and ... Views: 996
Yes, 25 tips, because that’s how we roll. No home security tip is too trite. They are all important, especially when used all at once, all the time.
Keep shrubs and trees manicured so that burglars can’t hide near them.
Do a door and lock inventory to make sure they all ... Views: 996
When you hear the dictum, “You should protect yourself from identity theft,” do you equate this with pushing a wheelbarrow loaded with rocks up a hill? It would actually be more accurate to picture slicing into a fresh apple pie, because identity theft protection is as easy as pie. ... Views: 996
With seemingly more and more people being harassed, stalked and getting their identities stolen, the rate of background check requests (e.g., a small business owner hiring a private investigator) has increased quite a bit.
The background check is no longer some snoopy kind of thing for ... Views: 995
A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit would be a burglar breaking into your house. The burglar is dressed all in black, so that his form blends into the darkness. He tiptoes around to hide his sounds so he’s more ... Views: 993
You’ve probably heard of people storing information in “the cloud,” but what does that really mean, and is it safe to put your data there?
The cloud is best described as a network of servers offering different functions. Some servers allow you to store and access data, while others provide an ... Views: 993
It’s been said that there are over a million different apps for the smartphone. Well, however many may exist, know that not all of them are passing security tests with flying colors.
You may already be a user of at least several of the 25 most downloaded apps And what’s so special ... Views: 992
Frosty the Hackman is teaming up this season with the Grinch to scam people out of their money. Shopping online is a godsend, but it brings with it a pristine opportunity to be ripped off.
Avoid Phishing Scams. Never click on links inside e-mails even if they’re (allegedly!) from ... Views: 990
A burglary occurs every 15 seconds. The chance of your home being broken into is higher than you’d think. The good news is that today’s alarm systems are “not your father’s alarm.”
Twenty years ago, a contractor had to spend a week tearing up your walls ceilings, ... Views: 990
Gee, it sounds like something out of one of those 1970s TV shows about government spies, but it’s reality: Plug this little thing into a wall socket and it records the keystrokes of a person nearby typing into a Microsoft wireless keyboard. The little gadget sends the information back to ... Views: 989
The next time you’re in a public place and glued to your smartphone or tablet — whether it’s at the gym, a coffee house, the airport, or just a park bench— know that someone might be peering over your shoulder to see what you’re doing. The snooper could just be ... Views: 989
Have you heard of iDict? It’s a tool that hackers can use to get passwords via what’s called brute force attacks. It’s designed to crack into iCloud’s passwords, and supposedly it can circumvent Apple’s anti-brute force attack security.
But iDict doesn’t ... Views: 987
“Don’t be afraid of the dark” is a reassurance that burglars never need; they need to hear, “Be afraid of the lights.”
A house that’s often dark sends a flare to burglars that nobody’s home, or, at least, that nobody will see the burglar doing what he ... Views: 987
If you want to be a pro at privacy, here’s a tip: When it’s time to go online, whether it’s at an airport lounge, coffee house, hotel, or any other public Wi-Fi spot, don’t log into any of your accounts unless you use a virtual private network (VPN).
A VPN is a ... Views: 986
It’s up to the potential victim—the user—YOU—to make your computer or smartphone very difficult for Joe Hackster to infiltrate.
Passwords
Being that cyber crime has been a fixture of modern living for over a decade, you’d think that everyone and his brother ... Views: 985
Remember the good ‘ol days when you thought of a finger pushing a button that launched a Russian missile that then sped at seven miles per second towards the U.S. to blow it up?
Little did we know back then what would one day be a way for the Superpowers to war on each other: cyber ... Views: 985
Editor’s Note: In this week’s guest blog security expert Robert Siciliano explains how to protect your IT systems and your business from hardware failure. To learn more, download our new e-book, “5 Things Small Businesses Need to Know about Disaster Recovery.”
It is ... Views: 985
In an average year I’ll tally 75,000 airline miles. In an average week while waiting for the plane to board or while in flight I’ll see multiple laptop screens flipped open with an over the shoulder view of emails being sent and received, PowerPoint presentations being tweaked, ... Views: 985
If you want to know the latest on “any topic”, just sign up for Google Alerts. Google will e-mail you notifications of new information coming online. I have Google Alerts for “Home Invasion” “Identity Theft” “Burglary” “Computer ... Views: 984
You’d think that it would be as easy as pie to avoid getting reeled in by a phishing scam. After all, all you need to do is avoid clicking on a link inside an email or text message. How easy is that?
A phishing scam is a message sent by a cybercriminal to get you to click ... Views: 983
Cartoonist Ben Garrison posted something “about the Fed” online, says an article at www.vice.com, and this created a firestorm, leading to his billing as the “most trolled cartoonist in the world.” You see, his other cartoons were altered in an offensive way, fooling ... Views: 983
Spring is here (at least in some parts of the world in the northern hemisphere)! The bees are buzzing, the flowers are blooming, and the accountants are working late because for those in the U.S., it’s tax season! Scammers love tax season—there is a lot of money moving around as ... Views: 983
Most people don’t like that “fall back” time change every November, but you know who does? Burglars. Burglars love to “fall back” because it gives them more time to practice their criminal activities thanks to the earlier veil of darkness. This is also a convenient ... Views: 980
Hah, that dual chamber deadbolt and the door jamb reinforcement! Yup, they’re good at keeping thieves from getting to your jewelry box and stash of $100 bills, but what about your bank accounts and identity?
If you have any “smart” gadgets in your house, cybercriminals may ... Views: 978
Do you shop at Amazon.com? Are you aware they have a back door through which hackers can slip in?
Let’s look at Eric’s experience with hackers and Amazon, as he recounts at medium.com/@espringe.
He received an e-mail from Amazon and contacted them to see what it was about. ... Views: 976
Burglars love doors, because that’s their No. 1 way of gaining entry to a house. When thinking of ways to make your home safer, you should really home in on your doors.
Solid wood door without a window (ideally with solid wood core)
Top flight deadbolt (ideally two)
Reinforced frame ... Views: 976
Whoever thought that one day, paying with green paper would be viewed as primitive as a horse and buggy? We seem to be getting closer to that time, especially since the security of making payments via smartphone is always being improved.
One way is with fingerprint scanning. Some smartphones ... Views: 975
Whether you’re an animal person or not, you have to admit that puppies are pretty darn cute. So cute that there are YouTube Channels, Facebook accounts, and Buzzfeed newsletters devoted to the subject. Unfortunately, there’s a not so cute PUP out in the world, and it wants access to ... Views: 975