Monthly Archive: March 2012

Are Your Employees Compromising Your Company’s Sensitive Information with Unsecured Mobile Devices?

Mobile devices have revolutionized the workplace by making near-instant response times possible outside of normal work hours. Who among us hasn’t worked into the night during a hotel stay or answered company email at Starbucks?  But when employees use unsecured devices such laptops, tablets and smartphones to do that, they greatly increase the risk to company networks and their sensitive data.

 

online scam

How to Report a Scam

The types of scams thieves can utilize are virtually limitless, and the prevalence of social networking and the ever-increasing use of technology in everyday lives have made these scams all the more simple to perpetrate.  If you have fallen victim to a scam, or even if you’ve only been targeted but were quick enough to spot the scam for what it was before volunteering your personal information, there are a few quick steps you can take to properly report the scam, in the hopes that the thief will not be able to victimize more unsuspecting consumers in the future.

WiFi Pineapple Redux: Hacking Toy Offers No Legitimate Use, Tricks Hotspot Users

You may remember an article I wrote last summer about “hack-in-a-box” tools that allowed novices to buy an off-the-shelf product that allowed them to hack wifi networks by simply flipping a switch.

One of the products I talked about is called WiFi Pineapple. As I wrote in last year’s post, WiFi Pineapple has only one purpose: to hack into unsecured wifi communications. They even admit it on their website:

Pinterest and Privacy

Are you pinning? Since the rise of Pinterest earlier this year, pinning is the new craze in social media. But what are the privacy implications of this network? Read more to find out.

Are You at Risk for Identity Theft? Take the Quiz

Maybe you have heard about identity theft in the news.  Perhaps you even know someone who has become a victim.  However, identity theft still remains one of those things that always happens “to someone else”. If you have wondered if it could happen to you then here is a quick quiz to gauge how at risk you are for becoming a victim of identity theft. Answer the questions below and add up the corresponding numbers to get your score:

 

The Government’s New Consumer Privacy ‘Bill of Rights’ a Positive Step Forward

The Obama Administration recently unveiled plans for a consumer privacy “bill of rights” that, at first glance, looks very promising.

The plan would give citizens more control over how their personal information is collected and used by online companies. It also sets standards regarding individual control, transparency, and accountability.

In a nutshell, this plan gives people the ability to opt out of having their personal data collected as well as forcing companies to adhere to clear and accessible privacy policies.

What Freelancers and Small Businesses Need to Know To Protect Their Online Security

Thanks to the Internet and wireless technology, freelancers can turn almost any place in the world into their workplace. But the speed and convenience of doing business online all the time carries special risks for the self-employed. That’s because they may not have the resources to implement strong online security measures.  Even worse, the self-employed may not be covered by the same fraud protection that’s available to individual consumers. Find out how you can protect your online security, as well as your clients’, when you do business on the Web.

 

military

The Military and Identity Theft

When the brave men and women of the United States Armed Forces are deployed for duty, the last thing on their mind should be whether or not someone will steal their identity while they are gone.

Got Personal VPN? Cisco Highlights Major Privacy Vulnerabilities of Wifi Hotspots

From session hijacking to session sidejacking, do you know all your vulnerable points in wifi hotspots?

If not, check out a new white paper from Cisco called “The Future of Hotspots: Making Wi-Fi as Secure and Easy to Use as Cellular.”

We have warned about these kinds of hotspot attacks for years, but it is significant that Cisco agrees with our analysis. After all, Cisco is the largest manufacturer of wifi equipment, having shipped 10 million wifi access points to customers.

If they are saying that wifi hotspots are inherently vulnerable to attacks, you can be sure that they know what they are talking about.

Lax Information Security Makes Hotels Low Hanging Fruit for Hackers

Let’s face it, hackers love hotels.  And not because they want to get away from it all. The huge volume of personal information collected, transmitted and stored by the hospitality industry has made it a prime target for cybercrime, according to a 2011 report by Willis Group Holdings, a global insurance broker. As hotels push consumers to conduct more of their business online, they’ve opened the door to cybercrime. Check out what you can do to protect your online security before you check in.