Archive for the 'Identity theft' Category
Monday, February 8th, 2016
In the social network, trust is the currency, and there is always something new to learn about the latest social media apps, changes to the existing most popular social media apps, and the tactics of cyber thieves and criminals to gain our trust and then exploit us. And so it goes with viruses and malware which are scripts and codes and apps designed to exploit individuals by stealing identities from social media accounts and other personal data accounts including banking, and/or to torment through cyber bullying and stalking.
Tuesday, January 5th, 2016
Effective January 1, 2016, the State of California is enforcing new rules for law enforcement to gather personal data, and for manufacturers of devices and web-enabled services, such as smart televisions and parking security services. The aim of the legislation is to protect the on-line privacy and civil liberty of citizens. And while legislation provides some very important safeguards against the abuse of personal data provided by consumers and citizens, the most important privacy measures are learned and enforced at home. This is to provide an overview of the new on-line privacy laws, and reinforce the things we must do at home to protect privacy.
Monday, November 9th, 2015
Email hacking is just one of the many ways in which cyber criminals seek to access personal information in order to exploit and plunder. As people become more accustomed to smart devices, every consumer product is web-enabled. The common term for this new reality is the “internet of things”, or IoT. Literally everything from cars to refrigerators and baby monitors are equipped with internet-enabled programming to operate remotely, according to consumer-prescribed settings which enhances convenience (for setting alarms, timing events and enabling remote access) and also introduces an element of risk from cyber hackers.
Monday, October 26th, 2015
If you sat down to calculate the number of on-line accounts associated with your email and/or phone number, it may be more than 20 - and setting and remembering secure passwords can be a challenge.
Monday, October 12th, 2015
Cheryl Cobbins is an identity theft prevention specialist with LegalShield in the Sacramento region, who encourages parents to think about the many ways in which personal data is shared and stored in electronic databases or in social media platforms, and then consider the importance of having access to experts if your personal data gets into the wrong hands. “There are so many ways that people wind up giving personal information through social media,” she said. “A parent sharing a proud moment by posting a picture of their teen with their driver’s license is one good example.”
Saturday, September 5th, 2015
Itay Glick is the CEO of Votiro Inc., an internet security services technology firm that specializes in identifying unknown threats embedded in emails and data exchanged in the context of an enterprise network. “The phishing threat is not just a concern for businesses,” Glick said, “Everybody is vulnerable. Phishing emails are sophisticated and contain references that are relevant to the user.” This is what is known as “spear-phishing” scams, which are personalized to deceive.
Monday, December 22nd, 2014
Christmas is a time when many families are making new investments in devices and apps. According to Google, the top searches for Christmas gift purchases are devices and game consoles, followed by wearable gear like FitBit. The most common problem with these new gadgets is the improper disposal or redeployment of the old ones leaving your personal information vulnerable to thieves and bad actors. According to cyber safety experts, deleting files is not enough.