Protect Your Privacy When Traveling

Podcast: Protect Your Privacy When Traveling

Whether you are traveling for work or pleasure, it is important to secure your data and protect your privacy when you are on the road. In this podcast, we talk about safely using Wi-Fi away from home, how to keep your data from prying eyes when crossing international borders, whether…

Continue Reading
What Can Be Done About Robocalls?

What Can Be Done About Robocalls?

Robocalls are ubiquitous. There were nearly 48 billion robocalls made nationally in 2018—that’s 146 for every person in America! Although some robocalls are legal, the vast majority are illegal telemarketing spam and outright scams. Legal (and harmless) robocalls include appointment reminders or other calls from your doctor’s office, pharmacy and…

Continue Reading

How “Stalkable” Are You?

Recently, a law school professor who teaches information privacy gave an optional assignment to her students: The students were to “try to determine a stranger’s identity, in a public place, using only Google search on your phone, based on things the stranger said loudly enough for lots of others to…

Continue Reading
FTC Fines Office Depot for Fake Malware Scan Results

FTC Fines Office Depot for Fake Malware Scan Results

According to the Federal Trade Commission (FTC), Office Depot and its sister company, Support.com, have agreed to pay fines totaling $35 million to settle complaints that they tricked customers into buying computer repair and technical services after deceptively claiming they had found malware symptoms on the customers’ computers. Office Depot…

Continue Reading
Health Apps Raise Privacy Concerns

Health Apps Raise Privacy Concerns

The Trump administration recently proposed new rules to give consumers greater access to their health information. The rules could become final later this year and they are intended to help unlock digital data held in hospitals’ health records as well as some health insurance claims. “It is removing friction points…

Continue Reading
What is Credential Stuffing?

What is Credential Stuffing?

What do criminals do with all of those passwords they steal? One answer is credential stuffing. The bad guys know that most people reuse logins and passwords at multiple sites, so when they get credentials from one site (e.g., from a data breach at Yahoo or any one of thousands…

Continue Reading
Apple Credit Card

Will the Apple Credit Card Change How Credit Cards Work?

Apple has announced that they will be releasing a new credit card in the summer of 2019. This card promises to be different from most other credit cards in several ways, and it will offer a number of benefits, including cash-back rewards, no fees, a promise of lower interest and…

Continue Reading
Accessing Data After Death

Accessing Data After Death

If someone close to you has passed, you may discover that you do not have access to important files stored on their computer, tablet, phone or social media accounts. There may be financial records, personal documents and emails or treasured family photographs that will be lost forever if you cannot…

Continue Reading
“Seeing” Through Walls with Wi-Fi

“Seeing” Through Walls with Wi-Fi

Forget about those x-ray specs that used to be advertised in magazines. Researchers have now found a way to “see” through walls using Wi-Fi. Although you can’t see Wi-Fi signals, researchers at the University of California, Santa Barbara have used ambient Wi-Fi signals and an ordinary smartphone to see and…

Continue Reading
Have I Been Hacked?

Have I Been Hacked?

Something isn’t right. Your computer is running much slower than usual. Your browser directs you to websites you didn’t choose to go to. Pop-ups are warning you that your system is infected, or that your system is locked and you have to pay a ransom to get to your files.…

Continue Reading

FEATURED PODCAST: SOCIAL ENGINEERING: ARE YOU THE WEAKEST LINK IN YOUR SECURITY?

Social engineering attacks manipulate users into giving up information wanted by the hackers. They often involve email or other communication to invoke urgency, fear or other emotions in the victim, leading them to reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, it can be difficult to prevent these kinds of attacks. The best hope of protecting yourself, your family and your company from social engineering attacks is to be aware of how they work and educate yourself and other users on how to avoid becoming a victim. In this interview, we discuss how to recognize a possible social engineering scam and how to deal with them.

Listen Now