Privacy in Public

Recent revelations that a driver for Uber and Lyft streamed video of passengers riding in his vehicle raised questions about whether consumers can expect privacy in any space they do not control, such as when they are driving on public streets, shopping at the mall or riding in someone else’s…

Continue Reading
Google Headquarters

Should Facebook and Google Pay Us for Our Personal Information?

Facebook, Google and other online services provide consumers free access to their platforms. However, nothing is truly “free.” We pay with our data and these companies make billions of dollars selling our personal information to advertisers and others. Now some people are starting to ask if the big tech companies…

Continue Reading

Does Privacy Matter if You Have Nothing to Hide?

When the news broke about Cambridge Analytica harvesting and using the personal information of Facebook users, many people discovered for the first time how much data Facebook stores on users and to how many companies they sell that data. But does it really matter how much Facebook, Google, Amazon and…

Continue Reading
Typing on keyboard

Using the Tor Browser for Private Web Surfing

Are you looking for a way to browse the Internet without leaving a trail of cookies and tracking pixels? One way is by using the Tor browser. Tor stands for “The Onion Router” because the layers of encryption are comparable to the layers of an onion. Tor works by connecting…

Continue Reading
Smart Device

Smart Devices Become Tools for Domestic Abusers

According to the Centers for Disease Control, one in three women and one in six men have been victims of physical violence or stalking by an intimate partner. Today, smart technology has given these abusers new ways to harass their victims. Apps and other tools designed to track children or…

Continue Reading
Webcam

Sextortion Scam Uses Real Passwords to Scare Victims

The Federal Bureau of Investigation (FBI) defines “sextortion” as “a serious crime that occurs when someone threatens to distribute your private and sensitive material if you don’t provide them images of a sexual nature, sexual favors or money.” In a new twist to this old crime, the criminals attempt to…

Continue Reading
GDPR: It’s Not Just for Europe

GDPR: It’s Not Just for Europe

In May 2018, the General Data Protection Regulation (GDPR) went into effect in the European Union (EU). The GDPR gives consumers in the EU greater control over their personal data and how it is used. Time reports that, “corporations need to explicitly ask if they can collect your data, they’re…

Continue Reading
Cryptocurrency and Blockchain

Podcast: Cryptocurrency and Blockchain

Cryptocurrencies such as Bitcoin are being promoted to consumers as investments, but many people do not understand what cryptocurrencies are or how they work. This interview will explore the world of cryptocurrencies and will also address how blockchain keeps cryptocurrencies and other data secure. Expert: Gustav Schmidt, a banking attorney…

Continue Reading
Little Things Mean a Lot

Little Things Mean a Lot

Which Harry Potter character are you?  Which Disney Princess are you? What cat is best suited to you? Which country best reflects your personality? Your Facebook feed may be filled with dozens of cute quizzes and surveys such as this. They can be fun, but answering those seemingly innocuous surveys…

Continue Reading
Protect Yourself (and Your Children) from “Revenge Porn”

Protect Yourself (and Your Children) from “Revenge Porn”

In “revenge porn” private photos or videos are shared without permission. These images are usually sexually explicit and shared to embarrass the victim. Some may be posted to revenge porn sites, but more often they are posted to social media where friends and family of the victim will see them.…

Continue Reading

FEATURED PODCAST: SOCIAL ENGINEERING: ARE YOU THE WEAKEST LINK IN YOUR SECURITY?

Social engineering attacks manipulate users into giving up information wanted by the hackers. They often involve email or other communication to invoke urgency, fear or other emotions in the victim, leading them to reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, it can be difficult to prevent these kinds of attacks. The best hope of protecting yourself, your family and your company from social engineering attacks is to be aware of how they work and educate yourself and other users on how to avoid becoming a victim. In this interview, we discuss how to recognize a possible social engineering scam and how to deal with them.

Listen Now