Monthly Archive: March 2012

Are Your Employees Compromising Your Company’s Sensitive Information with Unsecured Mobile Devices?

Mobile devices have revolutionized the workplace by making near-instant response times possible outside of normal work hours. Who among us hasn’t worked into the night during a hotel stay or answered company email at Starbucks?  But when employees use unsecured devices such laptops, tablets and smartphones to do that, they greatly increase the risk to company networks and their sensitive data.

 

online scam

How to Report a Scam

The types of scams thieves can utilize are virtually limitless, and the prevalence of social networking and the ever-increasing use of technology in everyday lives have made these scams all the more simple to perpetrate.  If you have fallen victim to a scam, or even if you’ve only been targeted but were quick enough to spot the scam for what it was before volunteering your personal information, there are a few quick steps you can take to properly report the scam, in the hopes that the thief will not be able to victimize more unsuspecting consumers in the future.

Private WiFi In the News: Hailed As Best Personal VPN Designed For the ‘Non-Techy’ Consumer Market

As CEO Kent Lawson has said, the Private WiFi software solution began because every IT department in a large company offers virtual private networks to employees who travel or spend some time working in their local coffee shops, and he felt it was time to offer a sophisticated yet simple consumer product that offered the same protections.

It’s nice to be recognized for being that simple solution — many thanks to the team at Tech Goes Strong for its recent recommendation of Private WiFi software as the best personal VPN solution for non-techy folks!

Here’s what they had to say about our product:

WiFi Pineapple Redux: Hacking Toy Offers No Legitimate Use, Tricks Hotspot Users

You may remember an article I wrote last summer about “hack-in-a-box” tools that allowed novices to buy an off-the-shelf product that allowed them to hack wifi networks by simply flipping a switch.

One of the products I talked about is called WiFi Pineapple. As I wrote in last year’s post, WiFi Pineapple has only one purpose: to hack into unsecured wifi communications. They even admit it on their website:

Pinterest and Privacy

Are you pinning? Since the rise of Pinterest earlier this year, pinning is the new craze in social media. But what are the privacy implications of this network? Read more to find out.

Video: ‘Smishing’ Scam Lures Victims Via Text Message

In true phishing fashion, a fake email tries to dupe recipients into clicking on the embedded links in an attempt to obtain sensitive information like credit card account numbers and passwords.

Now, smishing has come along and it combines the name of the technology used for text messaging (SMS, or short message service) with the word phishing.

Are You at Risk for Identity Theft? Take the Quiz

Maybe you have heard about identity theft in the news.  Perhaps you even know someone who has become a victim.  However, identity theft still remains one of those things that always happens “to someone else”. If you have wondered if it could happen to you then here is a quick quiz to gauge how at risk you are for becoming a victim of identity theft. Answer the questions below and add up the corresponding numbers to get your score: