Latest "Video Tips" Posts
Setting Up Account Alerts Can Help Protect You From Fraud.
Did you realize that you can have your credit card company and bank notify you anytime there is activity on your account? This tool makes it very easy to catch fraud before it stings your wallet.
Just over a year ago I appeared on Fox Business and wrote a blog about a Texas couple who learned their child’s baby monitor had been hacked when the intruder started screaming obscenities through the device. At the time the webcam system itself was found to have some glaring vulnerabilities, which were fixed by a firmware update, but I pointed out that the bottom line is that owners had not taken the necessary steps to secure their device and the onus was ultimately on them.
Now the news has broken about the latest in cyber espionage: a Russian website that is streaming footage from thousands of devices, including baby monitors, bedroom cameras, office surveillance systems and CCTV from gyms, in more than 250 countries, including feeds from 4,591 cameras in the United States. Not only are they streaming the footage, but they are providing the coordinates of where the cameras are located!
Holiday Security Tips: On the second day of Christmas, the experts gave to me, 2 shopping tips…
Black Friday and Cyber Monday will be here before you can say “Man, I ate a lot of turkey!” Malls, stores, restaurants and cafés are exceptionally busy places during the holidays. This breeds a perfect environment for data thieves to make off with your identity goodies while you shop, dine or relax. It only takes a second to steal a purse from a shopping cart, a briefcase from your car or a smartphone, iPad or laptop from an unattended café table. Solution: Lighten your load and leave excess identity at home.
- Consider taking only your mobile phone, driver’s license and one or two credit cards with you shopping to minimize the number of identity storage devices you might misplace. If you can fit the items in your pockets, your security increases. If you must have a purse, use one that zips and hangs in front of you, or consider using a backpack that stays on you at all times.
Watch Tech Geek Curtis Nasalbaum’s Response from the Leonard Nimoy Cruise
Every year, several of my keynote speeches are to ultra-high-wealth audiences. Because they have a lot of net worth to protect, their incentive to prevent identity theft and online fraud is on steroids. But for the average family with a normal amount of wealth, the incentive is just as important, because their wealth (albeit smaller), is just as vital to their lifestyle as it is to the wealthy.
And this isn’t just about wealth. All of us want to be able to keep hackers out of our private and often valuable online accounts, including: Gmail, Facebook, Dropbox, Twitter, Hotmail, Yahoo, banks, investment companies and all types of sensitive communications.
The answer, regardless of your wealth, is two-factor authentication (which is way too complicated a term for such a simple concept – I think the IT department named it that to ensure their job security). Two-factor authentication is also referred to as multi-factor authentication, two-step verification, 2FA and security tokens, none of which you need remember.
Today marks the start of the Affordable Care Act (aka Obamacare). As with any new, massive, government-sponsored program, scammers and identity thieves will try to take advantage of the public’s confusion and unfamiliarity with the new Health Exchanges (which we’re calling Obamacare Identity Theft).
There has been a great deal in the news about medical identity theft leading to death. Is it possible? Yes. Is it likely? Less likely than dying of a heart attack because you eat too much bacon. But let’s explore the possibility of death by medical identity theft (below, in this article), and why the threat gets sensationalized (in the video).
The free WiFi hotspot ritual is habitual. You head to your favorite café to get some work done “away from the office”. Justifying your $4 cup of 50 cent coffee with a Starbucks-approved rationalization (“I work so much more efficiently at my 3rd spot!”), you flip open your laptop, link to the free WiFi and get down to business. The caffeine primes your creativity, the bustling noise provides a canvass backdrop for your artful work and the hyper-convenient Internet access makes it easy for someone else (think organized criminal) to intercept everything you send through the air.
Check washing is so simple, you must learn to prevent check fraud
Are check fraud and check washing still relevant in the age of digital payments? If you’re like the average person, chances are you don’t write too many checks anymore. With the convenience of online payment options, nearly universal acceptance of credit and debit cards, and the proliferation of ATMs offering you easy access to money at every turn, why resort to the archaic, labor-intensive method of writing a check?
The simple answer—sometimes we have no other choice! Some places still don’t accept credit cards (Costco if you don’t have an American Express), or they charge an extra fee for them. Some retailers don’t offer online payment options. And frankly, sometimes it’s just an old habit and we haven’t made the effort to find a safer option because we’re stuck in the mindset of “it’s never happened to me” when thinking about check fraud.
Watch the entire Browser Spies Online Privacy series. To view the entire series, wait until the end of each video and click on the Next Video button in the lower right-hand corner of your screen. As you watch each short video in your browser, make the necessary changes based on each simple video tip on protecting your online identity and privacy.
Browser privacy expert John Sileo and Fox & Friends have teamed up to educate consumers on how your surfing habits are being intercepted, collected and sold as you browse the Web. These tips give you more control over your Internet Privacy in short, easy to implement tips. Privacy exposure, browser tracking and constant data surveillance are a reality of the digital economy. It’s important to defend your data privacy before it’s too late.