“Seeing” Through Walls with Wi-Fi

“Seeing” Through Walls with Wi-Fi

Forget about those x-ray specs that used to be advertised in magazines. Researchers have now found a way to “see” through walls using Wi-Fi. Although you can’t see Wi-Fi signals, researchers at the University of California, Santa Barbara have used ambient Wi-Fi signals and an ordinary smartphone to see and…

Continue Reading
Have I Been Hacked?

Have I Been Hacked?

Something isn’t right. Your computer is running much slower than usual. Your browser directs you to websites you didn’t choose to go to. Pop-ups are warning you that your system is infected, or that your system is locked and you have to pay a ransom to get to your files.…

Continue Reading
Social Security Scams

Social Security Scams

The caller ID says that the Social Security Administration (SSA) is calling. The number displayed matches the toll-free number of the SSA, (800) 772-1213.When you pick up the phone you hear a recorded voice telling you that your Social Security number (SSN) has been suspended because it was involved in…

Continue Reading

Podcast: Social Engineering: Are You the Weakest Link in Your Security?

Social engineering attacks manipulate users into giving up information wanted by the hackers. They often involve email or other communication to invoke urgency, fear or other emotions in the victim, leading them to reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a…

Continue Reading
Are Wi-Fi Freeloaders Threatening Your Security?

Are Wi-Fi Freeloaders Threatening Your Security?

Fans of “The Big Bang Theory” may recall this exchange in an episode from a few years ago: Penny: Hey, Sheldon, did you change your Wi-Fi password again? Sheldon: Yes, it’s “Penny, get your own Wi-Fi.” No spaces. The sitcom played it for laughs, but is it really funny to…

Continue Reading
Cardless ATM Fraud

Cardless ATM Fraud

Cardless ATMs allow customers to access bank accounts using their phones instead of a card. These transactions are not only faster than those requiring a card, they are generally more secure. They eliminate the risk of scammers getting your card data with skimmers and they use the security features of…

Continue Reading
Anonymous Data Isn’t Always Anonymous

Anonymous Data Isn’t Always Anonymous

An acquaintance recently mentioned to me that she was going to get a DNA report from one of the big DNA testing companies. Because I knew that Forbes reported that “many genetic-testing companies are actively selling user data to outside parties,” including pharmaceutical companies and others, I suggested that she…

Continue Reading

Security Resolutions to Keep Your Identity Safe

The New Year is a perfect time for making resolutions. So while you are resolving to work out more often, eat healthier and get out of debt, take a few minutes to make and implement these simple resolutions that will help protect you from hacking and identity theft. Expert: Gary…

Continue Reading

Biometric Privacy

Imagine not having to remember login IDs and passwords, and using a fingerprint or retinal scan for all of your logins. It is called biometrics, and it is already happening. Unlike passwords, where anyone with the password can access the account, biometric systems use both hardware and software to authenticate…

Continue Reading

How Scammers Gain Your Trust

One reason scammers are so effective is that they are skilled at getting their victims to trust them and fall for their scams. However, consumers who know the signs of a scam are better prepared to resist. When you understand how con artists work you will be able to nip…

Continue Reading

Soon, the Majority of Mobile Calls Will Be Fraudulent

After analyzing more than 50 billion calls made to mobile customers over 18 months, technology company First Orion predicts that nearly half of all calls to mobile phones will be fraudulent in 2019 unless the industry adopts and implements more effective call protection solutions. Over the past year, First Orion’s…

Continue Reading

Agent Tesla Malware

Keyloggers are nothing new, but Agent Tesla takes simple keyloggers to new levels. Among other capabilities, Agent Tesla can steal passwords from all major browsers, and capture snapshots of the victim’s keystrokes, their desktop, and pictures from their webcam at timed intervals, all while remaining undetected on the victim’s computer.…

Continue Reading

From the Internet of Things to the Internet of Bodies

“The line between human and machine is blurring—and creating new concerns about consumer safety and privacy rights,” says Mary Lee, a mathematician for the RAND Corporation. The Internet of Things (IoT) has seen us connecting everything from cars to toasters to light switches to the Internet. New medical devices now…

Continue Reading

Credit Freezes Are Now Free

A new federal law made credit freezes free as of September 21, 2018. Prior to the enactment of the Economic Growth, Regulatory Relief and Consumer Protection Act state regulations allowed a patchwork of fees for placing or lifting a credit freeze, but those fees no longer exist. A credit freeze…

Continue Reading