What to Do Before and After Your Phone is Stolen

What to Do Before and After Your Phone is Stolen

Most of us carry a big part of our lives around on our mobile phones. Phones store our contacts, photos, and more—including banking information, passwords and other sensitive personal information. If the phone is lost or stolen, our data and identity are at risk. In this podcast, we will look…

Continue Reading
False Business Listings on Google Maps

False Business Listings on Google Maps

Consumers routinely turn to Google Maps when they are looking for a locksmith, an urgent care facility, home repair services, or other local businesses. However, what they find may be fraud. Experts say that hundreds of thousands of false listings appear on Google Maps each month, adding up to about…

Continue Reading
Should Your Employer Have a Right to Your Fingerprints?

Should Your Employer Have a Right to Your Fingerprints?

When you use your face or your fingerprint to unlock your phone, you are using biometrics. Today many employers are using biometrics for “providing secure building access, tracking employee time and attendance, activating machinery, and authenticating users’ identities for increased computer and mobile device login security.”  According to a 2018…

Continue Reading
Malware Could Alter Medical Test Results

Malware Could Alter Medical Test Results

As more medical devices go online, there are more dangers of the data being hacked or compromised by bad actors. Researchers at Ben Gurion University demonstrated this by developing malware that could infect CT and MRI scanning machines used to diagnose cancer. Their intent, of course, was not to infect…

Continue Reading
Scams are Getting Personal

Scams are Getting Personal

Although email and telephone scams are nothing new, as consumers have caught on to the tricks used by scammers the bad guys have gotten more creative. Scams are now more personalized to trick victims into falling for them. Instead of sending the same badly-written email to millions of people, criminals…

Continue Reading
Doing Your Part to Control Political Disinformation

Doing Your Part to Control Political Disinformation

The proliferation of new digital platforms has created an abundance of information sources. As of 2017, 93 percent of Americans said they receive news online. This increased access to news sources has also led to the dissemination of disinformation and hoaxes, aka “fake news.” This issue is especially important with…

Continue Reading
5G Could Be a Hacker’s Dream

5G Could Be a Hacker’s Dream

Communication companies claim that new 5G networks could be up to a hundred times faster than current wireless networks. This speed would also reduce or eliminate latency (i.e., the time between instructing a computer to perform a task and its execution). As a result, there will be demand for and…

Continue Reading
Protect Your Privacy When Traveling

Podcast: Protect Your Privacy When Traveling

Whether you are traveling for work or pleasure, it is important to secure your data and protect your privacy when you are on the road. In this podcast, we talk about safely using Wi-Fi away from home, how to keep your data from prying eyes when crossing international borders, whether…

Continue Reading
What Can Be Done About Robocalls?

What Can Be Done About Robocalls?

Robocalls are ubiquitous. There were nearly 48 billion robocalls made nationally in 2018—that’s 146 for every person in America! Although some robocalls are legal, the vast majority are illegal telemarketing spam and outright scams. Legal (and harmless) robocalls include appointment reminders or other calls from your doctor’s office, pharmacy and…

Continue Reading

How “Stalkable” Are You?

Recently, a law school professor who teaches information privacy gave an optional assignment to her students: The students were to “try to determine a stranger’s identity, in a public place, using only Google search on your phone, based on things the stranger said loudly enough for lots of others to…

Continue Reading

FEATURED PODCAST: SOCIAL ENGINEERING: ARE YOU THE WEAKEST LINK IN YOUR SECURITY?

Social engineering attacks manipulate users into giving up information wanted by the hackers. They often involve email or other communication to invoke urgency, fear or other emotions in the victim, leading them to reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, it can be difficult to prevent these kinds of attacks. The best hope of protecting yourself, your family and your company from social engineering attacks is to be aware of how they work and educate yourself and other users on how to avoid becoming a victim. In this interview, we discuss how to recognize a possible social engineering scam and how to deal with them.

Listen Now