TikTok and the Hidden Dangers in Popular Apps

Many people consider the TikTok app to be a fun pastime where they can watch videos of kids dancing or post their own funny videos. However, there is a scarier side to TikTok. At the end of 2019 the military banned the app from government-owned devices. And, hardly a day…

Continue Reading

Claim Your Accounts Before the Bad Guys Do

Many people believe that by not using the Internet to manage their accounts they are keeping their personal information offline and staying safe. In fact, they may simply be making it easier for criminals to masquerade as them and take over their accounts. KrebsOnSecurity has documented many examples of scammers…

Continue Reading

How Identity Thieves Target You

Identity theft is constantly evolving. We come up with ways to thwart the bad guys, and they come up with new ways to steal from us. Although there is probably no way to make yourself 100% secure against identity theft, there are several things you can do to make yourself…

Continue Reading

Scammers Claiming Unemployment Benefits

When there is money to be claimed, scammers will be there claiming their (un)rightful share. According to the U.S. Secret Service, a Nigerian crime ring is committing fraud against many states’ unemployment insurance programs using Personally Identifiable Information (PII) obtained from identity theft victims. The scam operates very much like…

Continue Reading

Phony Debt Collectors, Phony Debt

Calls from debt collectors are bad news in any circumstances, but, what’s even worse, many of those calls are not legitimate. The caller may not be authorized to collect the debt, it may not be a debt incurred by the person receiving the call or the debt may not even…

Continue Reading

What to Do if You Are Doxed

“Doxing” refers to publishing a person’s private information (such as their home address, employment location, cell phone number, etc.) to get revenge or for “social justice” purposes. This can lead to harassment or physical harm of the target. In some cases, the target may become the victim of “swatting” which…

Continue Reading

Contact Tracing and Your Privacy

Contact tracing involves identifying people who have an infectious disease and the people with whom they have come into contact. That information is then used to reduce or halt the spread of the disease by taking preventive or curative measures. Diseases for which contact tracing has been used range from…

Continue Reading

Why (and How) You Should Be Using Two-Factor Authentication

Two-factor authentication (2FA) adds another level of security, beyond only a password, when you log in to apps and accounts. In this interview we will discuss how 2FA helps to secure your accounts, how it works and why you should use it. Expert: Steve Tcherchian Steve Tcherchian is the Chief…

Continue Reading

Do You Know Where That Cable Has Been?

We all learned as children that we shouldn’t take candy from strangers. It turns out we shouldn’t take charging cables from them either. According to Charles Henderson, Global Managing Partner and Head of X-Force Red at IBM Security, “There are certain things in life that you just don’t borrow. If you…

Continue Reading

What Does HTTPS Mean?

By now many people know that “https” before a web address means that the site is secure. However, they may not understand what “secure” actually means. Even the U.S. government doesn’t seem to fully understand it, as the Census Bureau site includes this false statement: “The https:// ensures that you…

Continue Reading

FEATURED PODCAST: SOCIAL ENGINEERING: ARE YOU THE WEAKEST LINK IN YOUR SECURITY?

Social engineering attacks manipulate users into giving up information wanted by the hackers. They often involve email or other communication to invoke urgency, fear or other emotions in the victim, leading them to reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, it can be difficult to prevent these kinds of attacks. The best hope of protecting yourself, your family and your company from social engineering attacks is to be aware of how they work and educate yourself and other users on how to avoid becoming a victim. In this interview, we discuss how to recognize a possible social engineering scam and how to deal with them.

Listen Now