Email Spoofing: Is Your Email Program Fooling You?

You look in your email inbox and see an email that says it is from someone you know. It even displays their picture. If you trust that this means the email is genuine, you are setting yourself up to be scammed as this is a technique commonly used in CEO…

Continue Reading

Geofencing Marketing and Politics

Geofencing is used for a variety of applications, but it is commonly used in direct to consumer marketing. When customers and their mobile devices enter a defined geographic area (e.g., within a specified range of a store location), they are shown a marketing message, such as a discount or coupon,…

Continue Reading

Blocking Robocalls

The good news about robocalls is that their numbers are decreasing, down 17% in June 2019 from an all-time high in March 2019. The bad news? There were still 4.35 billion robocalls in June! However, a new call authentication technology seems to be helping to reduce the number of nuisance…

Continue Reading

Deepfakes Are Coming

“You Won’t Believe What Obama Says In This Video!” It turns out that you shouldn’t believe what Barack Obama says in the linked video because he didn’t actually say it. The video reveals that the voice is that of filmmaker Jordan Peele and the video has been altered to make…

Continue Reading

How Your Family Members’ DNA Tests Affect Your Privacy

The capture of the Golden State Killer in April 2018 drew attention not only because his crimes were committed decades earlier, but for the way he was identified. Law enforcement used familial searches of DNA databases to track down the killer. Familial searches are based on the idea that family…

Continue Reading

How Your Boss Is Spying on You (And You Probably Can’t Do a Thing About It)

Wired magazine reports that 94% of organizations currently monitor their workers in some way. Monitoring and analytics software may measure how often you’re away from your desk, how quickly you respond to emails, what’s on your computer screen and more. The purposes of employee tracking may include better allocation of…

Continue Reading

Scam Proofing Your Parents

According to a 2016 study, people aged 50 and greater hold 83% of the wealth in the U.S. That makes them prime targets for scammers, along with the fact that doctors have found that even older people without identifiable cognitive impairment may experience brain changes that put them at “special…

Continue Reading
What to Do Before and After Your Phone is Stolen

What to Do Before and After Your Phone is Stolen

Most of us carry a big part of our lives around on our mobile phones. Phones store our contacts, photos, and more—including banking information, passwords and other sensitive personal information. If the phone is lost or stolen, our data and identity are at risk. In this podcast, we will look…

Continue Reading
False Business Listings on Google Maps

False Business Listings on Google Maps

Consumers routinely turn to Google Maps when they are looking for a locksmith, an urgent care facility, home repair services, or other local businesses. However, what they find may be fraud. Experts say that hundreds of thousands of false listings appear on Google Maps each month, adding up to about…

Continue Reading
Should Your Employer Have a Right to Your Fingerprints?

Should Your Employer Have a Right to Your Fingerprints?

When you use your face or your fingerprint to unlock your phone, you are using biometrics. Today many employers are using biometrics for “providing secure building access, tracking employee time and attendance, activating machinery, and authenticating users’ identities for increased computer and mobile device login security.”  According to a 2018…

Continue Reading

FEATURED PODCAST: SOCIAL ENGINEERING: ARE YOU THE WEAKEST LINK IN YOUR SECURITY?

Social engineering attacks manipulate users into giving up information wanted by the hackers. They often involve email or other communication to invoke urgency, fear or other emotions in the victim, leading them to reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, it can be difficult to prevent these kinds of attacks. The best hope of protecting yourself, your family and your company from social engineering attacks is to be aware of how they work and educate yourself and other users on how to avoid becoming a victim. In this interview, we discuss how to recognize a possible social engineering scam and how to deal with them.

Listen Now