Accessing Data After Death

Accessing Data After Death

If someone close to you has passed, you may discover that you do not have access to important files stored on their computer, tablet, phone or social media accounts. There may be financial records, personal documents and emails or treasured family photographs that will be lost forever if you cannot…

Continue Reading
“Seeing” Through Walls with Wi-Fi

“Seeing” Through Walls with Wi-Fi

Forget about those x-ray specs that used to be advertised in magazines. Researchers have now found a way to “see” through walls using Wi-Fi. Although you can’t see Wi-Fi signals, researchers at the University of California, Santa Barbara have used ambient Wi-Fi signals and an ordinary smartphone to see and…

Continue Reading
Have I Been Hacked?

Have I Been Hacked?

Something isn’t right. Your computer is running much slower than usual. Your browser directs you to websites you didn’t choose to go to. Pop-ups are warning you that your system is infected, or that your system is locked and you have to pay a ransom to get to your files.…

Continue Reading
Social Security Scams

Social Security Scams

The caller ID says that the Social Security Administration (SSA) is calling. The number displayed matches the toll-free number of the SSA, (800) 772-1213.When you pick up the phone you hear a recorded voice telling you that your Social Security number (SSN) has been suspended because it was involved in…

Continue Reading
Are Wi-Fi Freeloaders Threatening Your Security?

Are Wi-Fi Freeloaders Threatening Your Security?

Fans of “The Big Bang Theory” may recall this exchange in an episode from a few years ago: Penny: Hey, Sheldon, did you change your Wi-Fi password again? Sheldon: Yes, it’s “Penny, get your own Wi-Fi.” No spaces. The sitcom played it for laughs, but is it really funny to…

Continue Reading
Cardless ATM Fraud

Cardless ATM Fraud

Cardless ATMs allow customers to access bank accounts using their phones instead of a card. These transactions are not only faster than those requiring a card, they are generally more secure. They eliminate the risk of scammers getting your card data with skimmers and they use the security features of…

Continue Reading
Anonymous Data Isn’t Always Anonymous

Anonymous Data Isn’t Always Anonymous

An acquaintance recently mentioned to me that she was going to get a DNA report from one of the big DNA testing companies. Because I knew that Forbes reported that “many genetic-testing companies are actively selling user data to outside parties,” including pharmaceutical companies and others, I suggested that she…

Continue Reading

Security Resolutions to Keep Your Identity Safe

The New Year is a perfect time for making resolutions. So while you are resolving to work out more often, eat healthier and get out of debt, take a few minutes to make and implement these simple resolutions that will help protect you from hacking and identity theft. Expert: Gary…

Continue Reading

Biometric Privacy

Imagine not having to remember login IDs and passwords, and using a fingerprint or retinal scan for all of your logins. It is called biometrics, and it is already happening. Unlike passwords, where anyone with the password can access the account, biometric systems use both hardware and software to authenticate…

Continue Reading

How Scammers Gain Your Trust

One reason scammers are so effective is that they are skilled at getting their victims to trust them and fall for their scams. However, consumers who know the signs of a scam are better prepared to resist. When you understand how con artists work you will be able to nip…

Continue Reading

FEATURED PODCAST: SOCIAL ENGINEERING: ARE YOU THE WEAKEST LINK IN YOUR SECURITY?

Social engineering attacks manipulate users into giving up information wanted by the hackers. They often involve email or other communication to invoke urgency, fear or other emotions in the victim, leading them to reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, it can be difficult to prevent these kinds of attacks. The best hope of protecting yourself, your family and your company from social engineering attacks is to be aware of how they work and educate yourself and other users on how to avoid becoming a victim. In this interview, we discuss how to recognize a possible social engineering scam and how to deal with them.

Listen Now