We are currently looking for an Official SelfGrowth.com Guide to "Identity Theft". If you have expertise in Identity Theft and your own website and/or product for this topic, please review this form for complete details. The Official Guide Position is part of our Premium Placement Package
Have you ever had the chicken pox? This common childhood illness has another name—the varicella zoster virus. Like all viruses, varicella replicates itself, spreading though the body, and eventually appearing as itchy red blisters all over the body. But the virus doesn’t stop there; ... Views: 1175
Some thieves specialize in hanging around tourist spots to spot the tourists and make them victims of hands-on crime such as purse snatching or a mugging. But don’t wait till you’re aimlessly wandering the piazza with your face buried in a huge map to take precautions against less ... Views: 1173
Hackers love LinkedIn because it links them in—straight through the portal of the targeted company. Geez, how much easier could this be, what with all the publically-exposed e-mail addresses of key players (and also worker bees) in big companies that someone wants to hack.
An article on ... Views: 1172
I really enjoy reading blogs. And since you are here, reading my blog post, I’m guessing you do too. Blogs are a great way of gaining information and learning about different perspectives on a wide variety of topics. Unfortunately, spammers have tainted this medium with splogs.
The word ... Views: 1172
Burglars actually peruse social media to see who’s on vacation. In fact, 69 burglars were interviewed by Edith Cowan University in Australia, and perusing social media kept coming up as a way to find victims.
Keep your cyber mouth shut till you return. Here are more tips:
Get to know ... Views: 1171
Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time). And, although we hear about breaches and security flaws in the news, it seems like a lot of us don’t think it applies to our mobile ... Views: 1171
Bad news for users of the Xfinity home security system: It can report locked doors and windows that have been bypassed by an intruder and miss an intruder’s movements, says an article on wired.com.
The intruder circumvents the system by using a radio jammer to block the 2.4 GHz ... Views: 1171
Remember that song from 1984, “Somebody’s watching me?” It was a great foreshadowing of things to come: These days, people really CAN watch you while you go about your business at home…through your computer. So if someone confides in you that “they’re spying ... Views: 1170
There’s always a perfect time to assess your home’s safety and security. Do you employ all of the following practices?
Make sure your house’s roofing is fire resistant. If not, get it remodeled.
Not only should you have smoke and carbon monoxide detectors, but you should ... Views: 1169
There should be more TV commercials for preventing identity theft—it’s nearly epidemic. But also epidemic is the lack of identity security that people have when traveling. Here are some ways to avoid having your identity stolen while traveling:
Prior to leaving for your trip, ... Views: 1168
Wired internet or wireless WiFi, the warnings are out there: Don’t visit any websites that you have important accounts with when using a public computer (hotel, airport, café, etc.).
Visiting even a more trivial account, such as an online community for cheese lovers, could sink ... Views: 1168
Almost every week you can read a story about someone learning about the debt he never used or authorities busting gangs of identity thieves who spent hundred or thousands and sometimes millions of dollars stolen from unaware citizens.
Naturally you can follow tabloid media desire, get ... Views: 1168
The biggest mistake that you can make to threaten your online safety is to treat the online world different—as far as your private information—than you would treat the physical world. In other words, if someone walked up to you and said, “Hi, can you please provide me with your ... Views: 1166
Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I smell a rat. Literally, a RAT.
A RAT or remote administration tool, is software that gives a person full control a tech device, remotely. The RAT gives the user access to your ... Views: 1166
Will the home security scams ever stop? The latest scam has fraudsters going door to door, posing as sales reps for “Trio Alarm.” They first make sure that the houses they visit already have a security system (e.g., security decals on windows), then tell the occupant that the company ... Views: 1165
Healthcare data security is under attack from the inside. While insider threats — due to employee error, carelessness, or malicious intent — are a problem in every industry, they are a particular pox on healthcare data security. Two recent reports illustrate the gravity of the ... Views: 1162
Think about a time when you had a single credit card lost or stolen, and how much of a pain that experience was. Now imagine if your entire wallet was lost or stolen and the exponential magnitude of pain in the patootie that would be for you.
Run Over by the Bus
If you are a subscriber to ... Views: 1161
So what will you be doing this holiday season to avoid getting scammed? The scammers really come out of the woodwork during the holidays, waiting to snatch their victims. It’s easier than you think to avoid getting ripped off or getting your entire bank account sucked dry. Here’s how ... Views: 1160
Identity Theft is a very real threat in our society. Undoubtedly, you have read the staggering statistics regarding Identity Theft. If those facts do not make you step back a assess your current Insurance Program, I don't know what will. As I have spoken to countless people about the threat ... Views: 1160
Once a luxury item, free public WiFi has morphed into a standard service that consumers expect when patronizing everything from restaurants and retail stores to airports and hotels. Free WiFi users aren’t just checking Facebook or posting vacation photos to Instagram, either; all of us have sat ... Views: 1159
According to a recent report from Pew Research, many Americans take privacy seriously—as in the cyber kind, but also offline.
9% of survey respondents thought they had strong control over how much of their personal information was collected and shared.
38% thought they had moderate ... Views: 1158
At any given time, someone, somewhere, is probably googling you. This could be a former classmate, a neighbor, someone you’re trying to do business with, a relative, who knows?
Are you confident that whatever they find will be information that’s truly representative of you? Maybe ... Views: 1154
When someone online presents as a different person than their true self, this is called catphishing, and it occurs on online dating sites.
Google the name of the object of your interest. Obviously, “Kelly Smith” and “John Miller” won’t get you far, but ... Views: 1153
Many Americans, says a recent survey by Gallup, worry about a data breach connected to the use of their credit cards. Interestingly, many people use a credit card for everything under the sun: even just a soda and bag of chips from the convenience mart. The more you use a credit card, the more ... Views: 1153
It’s about time: a biometric for your smartphone that will change the way you think about biometric security.
This revolutionary biometric comes from Biometric Signature ID and it’s called BioTect-ID, and though it’s a biometric, it does not involve any so-called ... Views: 1153
Please, be humble and consider the possibility that you—yes you—might be committing numerous home security mistakes—that could really cost you if you don’t correct them.
House Alarm Turned Off
Some people only activate it when they are not home and others only ... Views: 1151
There are tried and true ways to protect yourself from identity theft—ways that you may not have even considered. Check them out (no specific order):
Evaluate your passwords. Does every online account have a different password or are you using the same one for multiple accounts? Fix ... Views: 1150
So just how are hackers able to penetrate all these huge businesses? Look no further than employee behavior—not an inside job, but innocent employees being tricked by the hacker.
A recent survey commissioned by Intel Security reveals that five of the top seven reasons that a ... Views: 1150
Recently I got a puppy for my child. We decided to name the puppy 4wgu23x5#9. My wife,8yysH3m, thought we should name the dog 0x2%#b5. But I’m sure she’ll get over it. Meanwhile, I’m helping my older child with setting up a few social media accounts, and I suggested the two ... Views: 1150
You’re dreaming of a white Christmas, and hackers are dreaming of a green Christmas: your cash in their pockets. And hackers are everywhere, and are a particular threat to travelers.
Prior to leaving for your holiday vacation, have an IT specialist install a disk encryption on your ... Views: 1150
Public Wi-Fi is the location where you can get online: airport, airplane, coffee house, hotel, motel and more. Many people don’t give this a second thought, unaware of how risky this really is.
Public Wi-Fi is very non-secure, a goldmine for hackers who want to steal your identity and ... Views: 1149
Twitter recently announced its new tool to help with management and monitoring of its users’ accounts: the Twitter data dashboard.
An article on lifehacker.com details what this new tool will offer. For instance, you will not need to use your real name on Twitter—and I have to ... Views: 1149
What is catphishing? It certainly isn’t Garfield lazily sitting in a canoe holding a fishing rod. Catphishing is when a fraudster fabricates an identity and tricks someone via cyber communication into a phony emotional or romantic relationship—usually for financial gain to the ... Views: 1149
You wouldn’t have to worry about privacy issues on Facebook if you didn’t post sensitive, private information on Facebook…such as information that one day can be used against you. And really, you should share only what you consider “professional” information, even ... Views: 1147
Whatever the appeal of sexting is to kids (attention), it’s definitely there, and won’t be going away too soon. Of all the things that teens can do in their daily lives, why spend time sexting?
To feel cool
To get a crush’s attention
To make a relationship seem more ... Views: 1147
A phishing attack is a trick e-mail sent randomly to perhaps a million recipients, and the thief counts on the numbers game aspect: Out of any given huge number of people, a significant percentage will fall for the trick.
The trick is that the e-mail contains certain information or is worded ... Views: 1144
Smart criminals love dumb homeowners, but even a dumb burglar can score big when the homeowner makes just a little slip in security measures.
Don’t nickel-and-dime your door locks; get high quality locks. A cheap lock is cheap.
Don’t hide keys. Anyone knows to check under the ... Views: 1143
If someone is “borrowing” your Wi-Fi service, there’s more to this than just the nerve of someone secretly mooching off of you.
Their use of your service could interfere with bandwidth and mess up your connection. If they’re a bad guy hacker or even a skeevy child porn ... Views: 1143
Ever hear of a crime called skimming? It may not be as dramatic a crime as assault or Ponzi schemes, but it can cause significant problems to you as your savings account can be wiped out in a flash.
Picture a scrawny nerd tampering with an automated teller machine (ATM)—the ... Views: 1141
Hacks do not happen in a vacuum; if one computer on a network is compromised, all machines on that network are at risk. For this reason, both enterprises and individuals have a responsibility to implement cyber security best practices – and this does not mean installing anti-virus software and a ... Views: 1140
Spring is in the air (if you’re in the northern hemisphere) and it’s traditionally a time to clean every nook and cranny and get rid of excess stuff in your house. But it’s also a good time to clean up your digital life. Just like your house, your digital life needs a good ... Views: 1139
Don’t wait to be in the dark to find out you’re in the dark. Are you equipped for a power outage? A power outage can even occur in perfect weather, thanks to a construction team “hitting a wire.”
Batteries. Don’t have these scattered haphazardly in some drawer. ... Views: 1139
Does your Lenovo computer have Superfish VisualDiscovery adware (a.k.a. spyware) installed? It’s possible if you purchased a Lenovo PC any time in September of 2014 and thereafter.
This Superfish software intercepts the Lenovo user’s traffic so that the user sees ads displayed ... Views: 1138
Burglary Protection
Don't forget, protecting your property is not only about safeguarding your valuables. It's also about protecting you and your loved ones. Not every intruder is going to run away if caught in the act. Aggravated burglary and home invasions can be pretty nasty affairs and ones ... Views: 1138
There are numerous subspecialties within the booming cybersecurity field[i]. Here are some of the most in-demand professions:
Cybersecurity Engineer: This is the all-around, jack-of-all-trades, go-to guy or gal of cybersecurity. For all intents and purposes, a cybersecurity engineer is a ... Views: 1137
A recent study says that people are more mindful of online safety issues than what experts had previously believed. An article on phys.org says that Nitesh Saxena, PhD, wanted to know what goes on in users’ brains when they come upon malicious websites or malware warnings.
Saxena points ... Views: 1137
Work computer. Home computer. Email. Mobile phone.
These are just a few potential avenues that can be a security threat.
Digital privacy invasion is a real threat. One that you are at risk for every day, and may not even know it.
'Big brother'...the powers that be in Washington along ... Views: 1137
It’s amazing how ingenious cybercriminals are, but the victims also need to take some responsibility for falling for these ruses, especially when the victim is a business that has failed to train its employees in cybersecurity measures.
Ransomware
The stuff of science fiction is here: ... Views: 1137
If you think there’s like a million apps out there, that’s not exactly an exaggeration. For sure, there are more than you can imagine, which makes it easy to conceive that many certainly come with security problems.
In fact, out of the top 25 most popular apps, 18 of them bombed on a security ... Views: 1132
About a year ago, I said the exact same statement, "Help me fix my computer for free." While I would have normally be willing to pay just to have my computer fixed, the problem was I was heavily cash strapped and I really did not have any budget for my computer. So I told that same phrase to a ... Views: 1132