The Dangers of Push Notifications

VWO.com defines push notifications as “clickable pop-up messages that appear on your users’ browsers irrespective of which device they use or which browser they are on.” You may choose to allow push notifications from websites or apps you use regularly to keep you informed of news and updates that you…

Continue Reading

Secret Dots Track Documents to Your Printer

Do you use a color laser printer in your home or office? If so, it almost certainly adds identifying code to all of your documents telling the date and time a document was printed along with the printer’s serial number. How does it work? In one method, the printers add…

Continue Reading

Is Amazon Sharing Your Personal Information (and Your Internet Connection)?

Amazon has detailed records of the information you have provided about yourself over the years. Although there isn’t one master list of all of the data Amazon has accumulated about you, it is possible to find it all. Use this guide compiled by CNBC to find out what Amazon knows…

Continue Reading

Health Apps Disclose Confidential Consumer Information

Intertrust Technologies released a report showing that of the 100 health apps they studied: 71% of tested health apps have at least one high level security vulnerability that can be easily exploited and has the potential for serious damage The vast majority of health apps (91%) have mishandled/weak encryption which…

Continue Reading

Solar Winds Breach

It is bad enough when an account is breached, but what if that account controls network security for thousands of customers, and potentially thousands of their customers as well? Orion software, used by 33,000 organizations to manage their IT resources, was compromised by hackers, giving the criminals access to install…

Continue Reading

Vaccine Scams

With the rollout of COVID-19 vaccines, you know that scammers and their dirty tricks won’t be far behind. As with many scams, the bad guys are after both your money and your personal information. Along with claiming to sell early access to vaccines and saying that you are required to…

Continue Reading

Cybersecurity Trends for 2021

The landscape of cyberthreats is constantly changing. We will talk with a cybersecurity expert to learn what we can expect the greatest threats to be in 2021, the effects COVID-19 will continue to have on security and what consumers need to know to protect themselves and their families from the…

Continue Reading

Coming This Holiday Season: Package Delivery Fraud

Since the pandemic began, consumers are shopping less in brick and mortar stores and buying more online. That means that our email boxes are often full of delivery notices. And, we may not always remember exactly what we ordered or from where. Scammers are taking advantage of this with a…

Continue Reading

Secrets Your Photos Reveal About You

Consumers who believe they are careful about what information they share online may be surprised to learn just how much information is revealed through their photos. In addition to the pictures many routinely post to social media, our online video meetings and Facebook live videos can reveal details useful to…

Continue Reading

What Happens If I Lose My 2FA Device?

Two-factor authentication (2FA) provides an extra layer of security for your data, beyond just using a password. For example, it may involve having a code sent to your mobile device. But what happens if you lose that device? The good news is that, although it may be inconvenient, it is…

Continue Reading

Police Use Geofencing to Find Out Who Was at a Crime Scene

Geofencing is often used by marketers to target customers in a specific geographic location, for example to send coupons to potential buyers who are within a specified range of a retail store or restaurant. It has also been used by political campaigns to identify people who have attended rallies or…

Continue Reading

Cybersecurity While Working from Home

More employees than ever are working from home, and 85% of Chief Information Security Officers (CISOs) said that they had to sacrifice cybersecurity to quickly enable them to do so. Cybersecurity vendor Netwrix announced this and other findings from a June 2020 survey conducted to determine how organizations are responding…

Continue Reading

What is “Brushing” and Why is it Considered a Scam?

How can receiving merchandise you didn’t order and didn’t pay for be a scam? To most people getting free things in the mail sounds like a dream come true. While the person who receives the products may or may not be directly victimized, this practice, called “brushing”, is indeed a…

Continue Reading

TikTok and the Hidden Dangers in Popular Apps

Many people consider the TikTok app to be a fun pastime where they can watch videos of kids dancing or post their own funny videos. However, there is a scarier side to TikTok. At the end of 2019 the military banned the app from government-owned devices. And, hardly a day…

Continue Reading