COVID, Telemedicine and Insurance Fraud

Continue Reading

The Dangers of Push Notifications

VWO.com defines push notifications as “clickable pop-up messages that appear on your users’ browsers irrespective of which device they use or which browser they are on.” You may choose to allow push notifications from websites or apps you use regularly to keep you informed of news and updates that you…

Continue Reading

Secret Dots Track Documents to Your Printer

Do you use a color laser printer in your home or office? If so, it almost certainly adds identifying code to all of your documents telling the date and time a document was printed along with the printer’s serial number. How does it work? In one method, the printers add…

Continue Reading

Is Amazon Sharing Your Personal Information (and Your Internet Connection)?

Amazon has detailed records of the information you have provided about yourself over the years. Although there isn’t one master list of all of the data Amazon has accumulated about you, it is possible to find it all. Use this guide compiled by CNBC to find out what Amazon knows…

Continue Reading

Health Apps Disclose Confidential Consumer Information

Intertrust Technologies released a report showing that of the 100 health apps they studied: 71% of tested health apps have at least one high level security vulnerability that can be easily exploited and has the potential for serious damage The vast majority of health apps (91%) have mishandled/weak encryption which…

Continue Reading

Solar Winds Breach

It is bad enough when an account is breached, but what if that account controls network security for thousands of customers, and potentially thousands of their customers as well? Orion software, used by 33,000 organizations to manage their IT resources, was compromised by hackers, giving the criminals access to install…

Continue Reading

Vaccine Scams

With the rollout of COVID-19 vaccines, you know that scammers and their dirty tricks won’t be far behind. As with many scams, the bad guys are after both your money and your personal information. Along with claiming to sell early access to vaccines and saying that you are required to…

Continue Reading

Cybersecurity Trends for 2021

The landscape of cyberthreats is constantly changing. We will talk with a cybersecurity expert to learn what we can expect the greatest threats to be in 2021, the effects COVID-19 will continue to have on security and what consumers need to know to protect themselves and their families from the…

Continue Reading

Coming This Holiday Season: Package Delivery Fraud

Since the pandemic began, consumers are shopping less in brick and mortar stores and buying more online. That means that our email boxes are often full of delivery notices. And, we may not always remember exactly what we ordered or from where. Scammers are taking advantage of this with a…

Continue Reading

Secrets Your Photos Reveal About You

Consumers who believe they are careful about what information they share online may be surprised to learn just how much information is revealed through their photos. In addition to the pictures many routinely post to social media, our online video meetings and Facebook live videos can reveal details useful to…

Continue Reading

FEATURED PODCAST: SOCIAL ENGINEERING: ARE YOU THE WEAKEST LINK IN YOUR SECURITY?

Social engineering attacks manipulate users into giving up information wanted by the hackers. They often involve email or other communication to invoke urgency, fear or other emotions in the victim, leading them to reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, it can be difficult to prevent these kinds of attacks. The best hope of protecting yourself, your family and your company from social engineering attacks is to be aware of how they work and educate yourself and other users on how to avoid becoming a victim. In this interview, we discuss how to recognize a possible social engineering scam and how to deal with them.

Listen Now