WiFi in airplanes is expensive — up to $12.95 for a single flight. So one can assume that those who use it have important, and probably confidential, information that they need to communicate. However, the fact is that wifi in airplanes is just as insecure as free wifi offered in your corner coffee shop. Read on to learn why.
Category: Thought Leadership
This week we are fortunate to have guest writer Susie Jones, author of 8 Core Values: Security, Privacy, and Asset Protection. A business owner for the past 20 years — with the last six years spent working in online business ventures — today she shares the issue of online privacy invasions, learning to “opt out” of websites that track your information, and other steps to protect yourself online. Click above to read her suggestions for online security measures.
Because you must divulge some level of personal information in order to use and fully benefit from social networking sites, the risk of identity theft exists for people who use them. Learn the ways that you might put yourself at risk of identity theft and how to prevent this.
It might sound crazy, but it’s actually rather simple for some cyberpunk to drive to where you live or work, park out front, and put up cellphone antenna aimed at your home or office to hack your cell phone conversations, text messages, even emails. Think it’s not so simple? Think again, says CEO Kent Lawson, in this special post from May that we’re publishing again as part of our “Best of…” series. Click above to read all of Kent’s thoughts on a few “distressingly fragile” mobile trends you need to know about.
It can be very hard on somebody to find out that their Social Security Number (SSN) has been used for fraudulent purposes by their spouse. Unfortunately the normal procedure for clearing your credit reports of these fraudulent charges does not apply if you are currently married to the person using your information fraudulently.
We all know — and applaud — when wiretaps break major corruption scandals, such as Blagojevich in Illinois, or the recent Wall Street insider trading investigation. Or the delicious ones, like Spitzer’s dalliance with a New York call girl. But there is also something just a little scary about government wiretaps as well. Read more for some interesting facts from a report covering wiretaps in 2010 — and what would make you the subject of such an investigation!
The days of skirting the fact that you met your significant other on the Internet are gone. According to Match.com, 17% of couples married in the last 3 years, or 1 in 6, met each other on an online dating site.# The numbers are only expected to grow as the Internet plays a larger role in our day-to-day lives. People using such services need to know how to keep themselves from becoming victims of scams or identity theft.
In his latest “Ask the Excerpt” installment, CEO Kent Lawson points out why it’s more important than ever to use strong passwords — and also why it’s imperative to change passwords for your various login accounts. Otherwise, you might as well leave your house key under your doormat.
From children taking out mortgages to dead people filing income tax returns, identity thieves are stealing the lives of our most vulnerable citizens – damaging their credit, their reputation and their families’ peace of mind. Find out what you can do to protect your loved ones from the Number One crime reported by Americans – consumer identity theft.
Guest Blogger Nikki Junker, Social Media Coordinator and Victim Advisor for the Identity Theft Resource Center (ITRC), shares some of the scams that have been sent to her in just the last 24 hours.
You get denied for a card at your local department store because of delinquent accounts. You don’t have any accounts which are delinquent, so you check your credit report and it shows five credit card accounts that are past due. You now realize you have become a victim of identity theft. What do you do now?
CEO Kent Lawson points out how incredibly easy it is for ordinary people to hack WiFi. It doesn’t take any tech expertise — it doesn’t even take a geek — for someone to access your email passwords, logins, and other highly sensitive data. Read on to learn how this is happening — perhaps even to you!