I finally got one of those “I’m stuck in London” emails. My friend Kate’s Gmail account was hacked, and everyone on her contact list received an email from a hacker posing as Kate: “Hi, Apologies, but I made a quick trip, to London,United Kingdom and got mugged, my bag, stolen from me with my passport ...
Read Blog
I often hear Mac users say “Oh, I don’t have to worry about viruses. I have a Mac!” Well, unfortunately, those days have come to an end. The market share of Apple owners has tipped enough that criminal hackers are taking notice and creating malware targeting Mac users. McAfee explains that there have been Fake ...
Read Blog
McAfee’s most unwanted criminals have included pickpockets, Trojan viruses, and ATM skimmers, dumpster divers, spies, and wireless hackers and now phishers, shoulder surfers, and keyloggers. Identity theft can happen online or on the ground to anyone with a pulse, and even to the deceased. The key is awareness, vigilance, and investing in products and services ...
Read Blog
Most of us have become accustomed to giving out the last four digits of our Social Security numbers. But this customary request is becoming increasingly problematic, and two Rhode Island lawmakers are responding by pushing legislation to stop businesses from asking for the last four digits of customers' Social Security numbers. Researchers at Carnegie Mellon ...
Read Blog
Spyware is sold legally in the United States. This software records chats, emails, browsing history, usernames, passwords, and basically everything a person does on that PC. Some spyware programs can record everything in a video file, which can then be accessed remotely. This is all perfectly legal as long as the PC’s owner installs the ...
Read Blog
There are good and bad hackers. Here is a window into what they do and why: White Hat Hackers: These are the good guys, computer security experts who specialize in penetration testing and other methodologies to ensure that a company’s information systems are secure. These IT security professionals rely on a constantly evolving arsenal of ...
Read Blog
It is easier than ever to guess or predict an individual’s Social Security number, which puts us all at a greater risk for identity theft. Researchers at Carnegie Mellon University have developed a reliable method for predicting Social Security numbers, using information from social networking sites, data brokers, voter registration lists, online white pages, and ...
Read Blog
#1 New Account Fraud Using another's personal identifying information to obtain products and services using that person’s good credit standing.  This fraud often requires use of the victim's Social Security number. Opening new utility, cell phone and/or credit card accounts are the most prevalent forms of new account fraud. #2 Account Takeover Fraud Using another ...
Read Blog

Data Privacy Day

By on
This is a critical time for our personal security as it relates to privacy and personal information. A battle is being waged over our data, and there are several parties involved in this fight. My concern is securing the personal details that you would prefer to keep private. Criminal hackers and identity thieves want to ...
Read Blog
The ability to connect wirelessly has a lot to do with the indispensability of the Internet in our daily lives. Wireless Internet is available in our homes, offices, cafes, restaurants, parks, hotels, airports, cars, and even airplanes. The mobility factor allows us to work anytime, anywhere, on numerous devices. “Being connected” is at an all-time ...
Read Blog