Tagged: Hacking Threats

Connecting to WiFi with a Little Help from Your Facebook Friends and a Lot of Access for Your Enemies

If you’re one of the millions of Wifi users constantly looking for new ways to connect, a new free app called Instabridge might sound like just the ticket. The company promises to build the world’s largest Wifi network by letting users connect to their friends’ Wifi via Facebook.

But what would that mean for your wireless security and your privacy? We don’t think you’ll like the answer.

 

The 3 Riskiest Online Mistakes Travelers Make Every Holiday Season

Skim any travel website this holiday season and you’re bound to find an article or two about online security and traveling.  The articles certainly raise awareness of the precarious security situation while in airports and hotels, but they also generally fall short in a few ways.

Read more to learn three tips that supplement any on-the-road security plan to safeguard your sensitive personal information and avoid having your identity (or credit card number) stolen this month.

Why Medical Devices Provide Little or No Protection Against Hackers

Wireless technology has made it possible to create implantable medical devices that do everything from monitoring the heart rhythms of patients to delivering the correct amount of insulin to diabetics. But according to a new report by the General Accounting Office, that lifesaving technology has also left the door wide open to hackers.

Find out why wireless medical devices could be dangerous to your health and to your pocketbook.

Data Breaches Continue to Happen At Banks, Colleges, and Beyond

October may be National Cybersecurity Awareness Month, but that doesn’t  mean cyber-crime is taking a vacation. Here are just some of the major data breaches — including users’ Social Security numbers and dates of birth — that have been reported in October. Read on for more information.

facebook

How do Facebook Hacks lead to Identity Theft?

There has been lots of attention paid to Facebook, and possible links to identity theft, over the past year.  The fact is that criminals do want your information, and will use it in many ways you probably have not imagined.  It is important to protect your user credentials, limit your friends to those you really do know, and be suspicious of links, games, and other enticements which may be links to security problems.  Clicking that link to the “Hot Blond Pole Dance” might be an expensive trip

‘Consumer Reports’ Unveils More Ways That Scam Artists Use Technology to Rip People Off

It’s already painfully obvious that identity thieves and cyber crooks are getting better at coming up with ways to rip us off. While it’s easy to feel one step ahead by using a personal VPN like Private WiFi and installing the most updated antivirus and firewall software on the market, sometimes we do, well, dumb things.

And thieves are hoping they can pounce when we’re not paying attention, cleverly exploiting all kinds of new technology to find fresh ways to steal our financial identity. Read on to find out why Consumer Reports says “fraud operates like a business these days.”

In fact, a new Consumer Reports study out this month reveals various ways hackers and crooks are using technology to steal from unsuspecting people.

Nearly 10,000 Malicious Websites Are Discovered Every Day: Tools to Protect Yourself Today

A couple of months ago, Google revealed that they discover 9,500 new malicious websites every day.

Also each day, over 12 million Google search queries contain at least one hacked website.

Google discovered these startling facts through its Safe Browsing Initiative, which they founded five years ago in an effort to clean up the Internet and keep their users safe from viruses, Trojan horses, and the like.

Are you at risk from these malicious websites? Read on to find out what these malicious websites can do and how you can protect yourself.

Hacker Gets 8 Years in Prison, U.S. Attorney Warns ‘Hack and Steal At Your Own Peril, Consequence Is Prison Time’

Joshuah Allen Witt, a 35-year-old Seattle man, was sentenced to eight years in federal prison for his part in a three-man WiFi hacking and burglary ring.

His two fellow hackers have already been sentenced to federal prison, so this third and final sentencing concludes the court trials for a series of crimes that took more than $3 million from up to 50 local businesses.

Why College Students’ Online Behavior Makes Them Prime Targets for Identity Theft

College students can’t get by without Wifi.  Six out of ten students won’t even consider attending a college unless it offers free on-campus Wifi, according to a recent study.  But most students don’t seem care about protecting their sensitive information when they’re using Wifi networks.  And that makes them prime targets for identity theft.  If you can’t imagine academic life without Wifi, find out how to make sure your identity doesn’t get stolen before you get your diploma.

 

security breach

2012: The Year of Massive Security Breaches

You might have noticed some disturbing security news last week: Yahoo reported that over 450,000 email usernames and passwords were stolen from the company’s databases by hackers and posted on the file-sharing account Pastebin.

Apparently Yahoo had stored these usernames and passwords without any encryption at all, making it very easy for hackers to steal them.

While having one’s email account hacked is bad enough, the news is actually worse than it sounds. Many of the hacked usernames and passwords were identical to those used in other website accounts, such as PayPal or online banking accounts.

Pop Quiz: Do You Have to Provide Your Child’s Social Security Number on School Enrollment Forms?

 

This recent editorial cartoon in The New Yorker put a face on how simple it is for hackers to succeed at stealing sensitive information online.

It happens as easily to adults as it does to kids.

Nearly 400,000 kids get their identities stolen each year, according to the Federal Trade Commission.

In fact, federal authorities have warned about people with bad credit buying “credit profile numbers” or CPNs from businesses that use computers to locate and sell Social Security numbers issued to children.

Identity thieves steal kids’ Social Security numbers because their credit is generally untarnished. It’s not until years later — when they apply for a store credit card, a college loan, or a job — that they find out their credit has been destroyed.