Keeping Kids Safe from Online Predators

Most children spend hours every day online. Much of that time is spent messaging with others. Gaming and social media apps provide a way for children to connect with others, but sometimes those others are not what they appear to be. In this podcast we discuss where predators seek children…

Continue Reading

Phishing Scheme Gives Bad Guys Access to Your Cloud Data

As online users become more sophisticated, hackers are becoming more sophisticated as well. Early phishing attacks relied on users clicking links without paying attention to where the links took them. For example, a hacker would create a page that looked just like the PayPal login page, but it was actually…

Continue Reading

What Does Google Know About You?

How much does Google know about you? Probably a lot more than you realize. According to the founder of search engine DuckDuckGo, even if you do not directly use Google products, their trackers are found on 75% of the top million websites. “(Google isn’t) really a search company anymore –…

Continue Reading

Is Your Phone Spying on You?

Have you ever noticed a sudden flurry of ads in your Facebook feed on a subject you recently talked about with friends—even though the conversation didn’t take place online and you didn’t search for or read online content about it? Others have noticed that, too. They wonder if their phones…

Continue Reading

Money Mules

Money mules are individuals who are hired to receive and forward funds through their personal or business bank accounts. According to the Federal Bureau of Investigation (FBI), “Money mules help criminals launder their proceeds derived from criminal activities, by adding layers of recipients to the money trail.” This makes it…

Continue Reading

Child Predators Target Victims Through Online Gaming

It’s no secret that child predators seek victims wherever they can find them and, according to the Federal Bureau of Investigation (FBI), one current popular avenue is online gaming. The Pew Research Center notes that 97 percent of American teenage boys and about 83 percent of girls play video games,…

Continue Reading

Millennials Scammed More Than Seniors

There is a belief that seniors are the victims of most scams, but scams affect people of all generations. In fact, data from the Federal Trade Commission (FTC) indicates that millennials are 25% more likely to report losing money to fraud than those over 40. However, the types of scams…

Continue Reading

Email Spoofing: Is Your Email Program Fooling You?

You look in your email inbox and see an email that says it is from someone you know. It even displays their picture. If you trust that this means the email is genuine, you are setting yourself up to be scammed as this is a technique commonly used in CEO…

Continue Reading

Geofencing Marketing and Politics

Geofencing is used for a variety of applications, but it is commonly used in direct to consumer marketing. When customers and their mobile devices enter a defined geographic area (e.g., within a specified range of a store location), they are shown a marketing message, such as a discount or coupon,…

Continue Reading

Blocking Robocalls

The good news about robocalls is that their numbers are decreasing, down 17% in June 2019 from an all-time high in March 2019. The bad news? There were still 4.35 billion robocalls in June! However, a new call authentication technology seems to be helping to reduce the number of nuisance…

Continue Reading

FEATURED PODCAST: SOCIAL ENGINEERING: ARE YOU THE WEAKEST LINK IN YOUR SECURITY?

Social engineering attacks manipulate users into giving up information wanted by the hackers. They often involve email or other communication to invoke urgency, fear or other emotions in the victim, leading them to reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, it can be difficult to prevent these kinds of attacks. The best hope of protecting yourself, your family and your company from social engineering attacks is to be aware of how they work and educate yourself and other users on how to avoid becoming a victim. In this interview, we discuss how to recognize a possible social engineering scam and how to deal with them.

Listen Now