Ever wonder how a water leak sensor actually works?
Water comes into contact with the sensor. The sensor makes and electrical contact and send a signal.
The sensor transmits a signal to a central station of sorts (kind of like how if extreme heat or a needle comes in contact with your ... Views: 825
I love that show, “Forensic Files.” Every so often there’s the case of a person who was found murdered in their apartment due to some forced entry. Which brings me to the topic of apartment security.
New Apartment
Don’t delay in doing a walk-through of the entire ... Views: 849
Imagine the effectiveness of the following sign at your front door when a would-be intruder reads it:
WARNING: This house is protected by a remote monitoring service; if you break in while the homeowner is away, he’ll be instantly alerted and the police will be automatically ... Views: 685
Cybercriminals know that the best way to get their claws on the next victim is to appeal to their emotions, not logic.
There’s lots of scary things in life, and one is learning that your computer has been infected with a virus. If this happens, you’re now vulnerable to spending ... Views: 737
Most people have heard of storing information in “the cloud,” but do you know what this means, and if it is even safe?
A cloud is basically a network of servers that offer different functions. Some of these servers allow you to store data while others provide various services. The ... Views: 838
This week I worked with Gemalto, as part of Gemalto’s #ChipAwayAtFraud campaign. I was tasked with using my “chip” card when making a bunch of every day purchases like getting coffee and shopping. Gemalto, one of the world’s leaders in digital security, wanted a ... Views: 791
If you want to get an idea of how safe or crime-ridden a town may be, do some casual observing including at night:
Are women walking or jogging alone at night?
Are people hanging out in the evening having a good time?
Are children mysteriously absent on a sunny weekend afternoon?
Are ... Views: 808
Often, hucksters prey on the consumer’s desperation, which is why it’s no surprise that the No. 1 rip-off (at least between 2011 and 2012)) was bogus products promising weight loss.
VICE (vice.com) interviewed psychologist Maria Konnikova about how cyber cons are so ... Views: 816
Scams targeting older people are probably very under-reported, as seniors don’t want to appear senile. The most vulnerable group is educated men over 55, because, quite frankly, they think they know everything.
Sweepstakes/Lottery
This scam comes in many forms, but the common ... Views: 838
What are you doing to prevent tax identity theft? Do you even know what steps to take? You’d better, because this crime has tripled since 2010, says the FTC.
A report on foxbusiness.com describes tax identity theft as the act of stealing someone’s personal information, ... Views: 815
Ever wonder how a motion detector works? How can some inanimate object “know” you’re creeping nearby, even if you’re as quiet as a mouse? This amazing technology can be broken down into several types.
Active Ultrasonic
When an object moves, it can bounce back ... Views: 796
Between half and three quarters of all employees have downloaded personal apps to company tablets and phones, according to surveys. At the same time, people are increasingly using use personal phones for work purposes like email, document-sharing and the list goes on.
What does it all ... Views: 842
When you go traveling, I’m sure you make a point to protect the various things you bring with you—including your laptop, children, even spouse. But what about something you left behind? Your home? Is that being protected too?
Before Leaving
Don’t wait till the ... Views: 785
As part of Gemalto’s #ChipAwayAtFraud campaign, I’m being tasked with numerous tasks, some tacky, some essential to living. Gemalto, one of the world’s leaders in digital security, wants a real-world take on the EMV card experience. Which includes the security benefits EMV ... Views: 831
Many so-called psychics are frauds. But so are some auto mechanics, lenders and roofers. There’s fraud in just about all lines of work.
What we do know is this: There’s not enough evidence to refute paranormal phenomena. Nor enough to prove it beyond a doubt.
And ... Views: 1077
Cyber crime sure does pay, according to a report at Intel Security blogs.mcafee.com. There’s a boom in cyber stores that specialize in selling stolen data. In fact, this is getting so big that different kinds of hot data are being packaged—kind of like going to the supermarket and ... Views: 857
Bottom line: If you have a data security policy in place, you need to make sure that it’s up to date and contains all of the necessary elements to make it effective. Here are 10 essential items that should be incorporated into all security policies:
1. Manage employee email
Many data ... Views: 909
Your home should have multiple layers of protection. You’ve certainly heard that before. Motion detection is a critical layer of protection, and this is comprised of the simple act of unauthorized movement sensed as the result of breaking and entry. Glass break is similar in concept. One ... Views: 960
Frankly, naked babies shouldn’t be a big deal. If you don’t have naked baby pictures of your kids in the kitchen sink then you aren’t human. BUT….the world has changed. If you compare posting your children’s photos online with whipping out a wallet photo of your ... Views: 772
Are you thinking of getting a personal loan? Hopefully you have a high credit score, as this will give you a better chance of getting the loan through a legitimate company. But even if your credit is excellent, you need to be aware of the personal loan scams out there.
Not Respecting Your ... Views: 784
No bones about it, 2016 is sure to see some spectacular, news-chomping data breaches, predicts many in infosec. If you thought 2015 was interesting, get your seatbelt and helmet on and prepare for lift off…
Wearable Devices
Cyber crooks don’t care what kind of data is in that ... Views: 921
Companies are constantly attacked by hackers, but what if those attacks come from the inside? More companies than ever before are dealing with insider security threats.Here are 11 steps that all organizations should take to mitigate these threats and protect important company data:
Always ... Views: 902
“I don’t need to lock my doors all the time; this neighborhood is very safe.” And I have some land in the Caribbean I’d like to sell you.
Burglars know that every “safe neighborhood” has a certain percentage of fools who think they’re immune to ... Views: 843
Wow cool! A device that lets you know, via Internet, when your milk is beginning to sour! And a connected thermostat—turning the heat up remotely an hour before you get home to save money…and “smart” fitness monitors, baby monitors, watches…
Slow down. ... Views: 815
You just learned you have a new credit card account by checking your credit or because a bill collector called you. Problem is that you don’t remember ever applying for it. You must find out what’s behind this new account and how it got there.
Call the corresponding phone number ... Views: 935
When it comes to tossing into the rubbish your old computer device, out of sight means out of mind, right? Well yeah, maybe to the user. But let’s tack something onto that well-known mantra: Out of site, out of mind, into criminal’s hands.
Your discarded smartphone, laptop or ... Views: 836
For those of you who want to knock your presentations out of the park and be the speaker everyone raves about, Victoria LaBalme is leading an unbelievably unique workshop titled Rock the Room LIVE.
If you create and deliver keynotes, trainings, breakouts, podcasts, videos, webinars or ... Views: 766
“You can buy things with your phone!” No kidding! But imagine what the response would have been had you made this statement in 1984: “Off your meds, eh?”
Purchasing via the smartphone may very well eclipse the popularity of shopping via laptop. And cyber thieves ... Views: 934
No company is immune from hackers—even a toy company. Hong Kong based VTech got hit by a hacker recently. This company makes techy educational toys for kids, and its database got breached.
Customers go to the Learning Lodge store and download content to their children’s VTech ... Views: 863
If you’re going to drone on and on about how you got hacked by a cyber thief, maybe it’s because you played with your new drone—you know, those rad little flying devices that hover via remote control over your street? Yes, they are hackable.
If you don’t have a drone, ... Views: 912
A group of people who are actively collaborating to commit identity fraud is known as an identity fraud ring. These rings are generally made up of two or more career criminals, often including family members or close friends. These rings work by members either stealing a victim’s identity ... Views: 943
As the holiday shopping season quickly approaches, identity thieves are quickly looking for their next victims. In Indiana, government officials are taking steps to stop these thieves in their tracks. Just recently, the state’s Attorney General Greg Zoeller was in Fort Wayne to announce ... Views: 1112
Wow, a lawyer in Memphis got scammed by his secretary—she embezzled over $362,000 from him, says an article on wreg.com. Attorney Jerry Schatz hired Teresa Sumpter, 48, in July of 2013.
Little did he know that his assistant would end up stealing checks from his trust account, forging ... Views: 817
Have you ever tried to take a picture or video of someone with your phone without them knowing? Sometimes it’s possible, but sometimes it’s not. Well, maybe you knew it was coming: “Ghost apps” are available that let you take images and videos without the target’s ... Views: 948
Burglars actually peruse social media to see who’s on vacation. In fact, 69 burglars were interviewed by Edith Cowan University in Australia, and perusing social media kept coming up as a way to find victims.
Keep your cyber mouth shut till you return. Here are more tips:
Get to know ... Views: 1055
If the person you are sending an e-mail to pretty much instantaneously receives it, how on earth can you unsend or cancel it? Well, you have several options.
Criptext
This is a browser plug-in that works for Chrome and Safari.
Your message including attachments will be encrypted.
You ... Views: 885
Are you a cyber-blabber? Even a post about your daily afternoon foray to the sub sandwich shop could get you in trouble: A burglar reading this knows when to rob your house. But it doesn’t end there. STOP THE MADNESS!
The Giants: Facebook and Twitter
Be careful what you post on ... Views: 851
There are tried and true ways to protect yourself from identity theft—ways that you may not have even considered. Check them out (no specific order):
Evaluate your passwords. Does every online account have a different password or are you using the same one for multiple accounts? Fix ... Views: 1026
That’s a horrible question to ask. There is a very alarming report on nbcsandiego.com, about a dad who regularly checked on his kids in the middle of the night, and one night at 2 a.m., upon checking his 12-year-old daughter’s room, saw that she was gone. The window was open.
He ... Views: 885
The season of giving is now upon us — but don’t forget, it’s also the season of stealing — and no, I don’t mean your wallet or the gift package at your doorstep, but your Social Security number, credit card information, medical records and any other highly ... Views: 808
The words “spying” and “stalking” have negative connotations, but there’s a flipside to the coin: parents monitoring their kids’ online activities and physical locations. And how about middle-aged adults keeping track of the whereabouts of their aged parents ... Views: 811
Even though the highly publicized retail data breaches have involved off-line brick and mortar stores, this doesn’t mean that security is high with online shopping. Scammers and hackers are waiting for you in more ways than you know, such as:
Fake product reviews
Non-existent ... Views: 796
Are you a shredder? I hope so. No identity thief on this planet is going to want to attempt to reconstruct cross-shredded documents.
So what, then, should you make a habit of shredding?
All financial documents and information, including financial information you’ve jotted on a ... Views: 841
Situations that could put your routine or an entire city on hold include:
Tornado
Hurricane
Flood
Blizzard
Power outage
Contagious illness
Your house should already be equipped with supplies for staying inside the house for at least a week, but ideally for two weeks.
Keep a newer ... Views: 903
Thinking of bringing a credit card with you on your travels? You can end up in a jam: You just treated your extended family to fine dining in France. Time to pay; your credit card is declined.
If you try to make a purchase overseas, your credit card company might think it’s fraudulent, ... Views: 1229
Sexting is the act of sending images of a sexual nature via cell phone, often naked pictures. Because texting technology is so readily available and easy to understand, parents should be quite leery of telling themselves, “Oh, MY kid would never do that!” Studies showy your kid ... Views: 878
The holiday season is ramping up. And so are burglars. Even if you don’t get very festive, burglars may still target your home. Your dark, unlit home among all the dazzling festive homes will stick out like a sore thumb. Whether you have 10,000 decorative lights on or none, here’s ... Views: 853
A sharp nine-year-old girl has a biting message to a 51-year-old man, according to an article on myfoxboston.com:
“You deserve to stay in jail because you break into peoples houses. Stop breaking into peoples houses and do something with your life.”
This advice was directed to ... Views: 961
So what will you be doing this holiday season to avoid getting scammed? The scammers really come out of the woodwork during the holidays, waiting to snatch their victims. It’s easier than you think to avoid getting ripped off or getting your entire bank account sucked dry. Here’s how ... Views: 1027
As the holiday season creeps upon us, research shows that an astonishing 24% people who are buying online have been duped by scammers. Whether you are buying shoes, electronics or the latest fashions and accessories, research companies are showing that you are at risk of being duped.
When you ... Views: 898