Is Your Phone Spying on You?

Have you ever noticed a sudden flurry of ads in your Facebook feed on a subject you recently talked about with friends—even though the conversation didn’t take place online and you didn’t search for or read online content about it? Others have noticed that, too. They wonder if their phones…

Continue Reading

Money Mules

Money mules are individuals who are hired to receive and forward funds through their personal or business bank accounts. According to the Federal Bureau of Investigation (FBI), “Money mules help criminals launder their proceeds derived from criminal activities, by adding layers of recipients to the money trail.” This makes it…

Continue Reading

Child Predators Target Victims Through Online Gaming

It’s no secret that child predators seek victims wherever they can find them and, according to the Federal Bureau of Investigation (FBI), one current popular avenue is online gaming. The Pew Research Center notes that 97 percent of American teenage boys and about 83 percent of girls play video games,…

Continue Reading

Millennials Scammed More Than Seniors

There is a belief that seniors are the victims of most scams, but scams affect people of all generations. In fact, data from the Federal Trade Commission (FTC) indicates that millennials are 25% more likely to report losing money to fraud than those over 40. However, the types of scams…

Continue Reading

Email Spoofing: Is Your Email Program Fooling You?

You look in your email inbox and see an email that says it is from someone you know. It even displays their picture. If you trust that this means the email is genuine, you are setting yourself up to be scammed as this is a technique commonly used in CEO…

Continue Reading

Geofencing Marketing and Politics

Geofencing is used for a variety of applications, but it is commonly used in direct to consumer marketing. When customers and their mobile devices enter a defined geographic area (e.g., within a specified range of a store location), they are shown a marketing message, such as a discount or coupon,…

Continue Reading

Blocking Robocalls

The good news about robocalls is that their numbers are decreasing, down 17% in June 2019 from an all-time high in March 2019. The bad news? There were still 4.35 billion robocalls in June! However, a new call authentication technology seems to be helping to reduce the number of nuisance…

Continue Reading

Deepfakes Are Coming

“You Won’t Believe What Obama Says In This Video!” It turns out that you shouldn’t believe what Barack Obama says in the linked video because he didn’t actually say it. The video reveals that the voice is that of filmmaker Jordan Peele and the video has been altered to make…

Continue Reading

How Your Family Members’ DNA Tests Affect Your Privacy

The capture of the Golden State Killer in April 2018 drew attention not only because his crimes were committed decades earlier, but for the way he was identified. Law enforcement used familial searches of DNA databases to track down the killer. Familial searches are based on the idea that family…

Continue Reading

How Your Boss Is Spying on You (And You Probably Can’t Do a Thing About It)

Wired magazine reports that 94% of organizations currently monitor their workers in some way. Monitoring and analytics software may measure how often you’re away from your desk, how quickly you respond to emails, what’s on your computer screen and more. The purposes of employee tracking may include better allocation of…

Continue Reading

FEATURED PODCAST: SOCIAL ENGINEERING: ARE YOU THE WEAKEST LINK IN YOUR SECURITY?

Social engineering attacks manipulate users into giving up information wanted by the hackers. They often involve email or other communication to invoke urgency, fear or other emotions in the victim, leading them to reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, it can be difficult to prevent these kinds of attacks. The best hope of protecting yourself, your family and your company from social engineering attacks is to be aware of how they work and educate yourself and other users on how to avoid becoming a victim. In this interview, we discuss how to recognize a possible social engineering scam and how to deal with them.

Listen Now