identity theft

10 Generally Helpful Tips To Protect You From Identity Theft

There have been countless breaches that have occurred over the years. Some of them have been after government bodies, but in most cases, hackers have been looking to gather data on folks like me and you.

While the use of that information gathered can vary widely, stollen information from places like banks or credit bureau agencies leave hackers more room to commit identity theft. What’s worse is in those instances those hackers can continue to exploit that information and leverage it indefinitely.

20 General Facts On Cybersecurity

Cybersecurity is rapidly growing every single day. There are all kinds of facts and statistics that emerge at a seemingly constant rate. Because of the nature of this industry, there are all kinds of facts that the general public isn’t aware of or gets lost amongst the masses.

To help with this, here are some alarming facts on cybersecurity you should be made aware of.

All Wi-Fi now hackable – this affects everyone!

This topic is so serious, I feel obliged to tell as many people as possible. This affects everyone! An extremely serious vulnerability has been exposed affecting everyone. We all use WiFi and we are all vulnerable to this latest attack.   KRACK ATTACK Two Belgian researchers discovered a vulnerability in the WiFi protocol (last year! …

Read more

Who is listening to you and recording everything?

Google, Microsoft, Apple, Samsung, and now Barbie.

Google has admitted to scanning your personal Gmail accounts to target ads based on common keywords found. They also record a lot of information “for your convenience” if you make are logged into Google or use a Chromebook. This includes every site you visit, every search term you use, the YouTube videos you watch and saving your passwords.

Microsoft records Skype instant messages (IMs) and has the potential for calls as well.

Apple records all Siri voice commands for an undetermined period of time. Microsoft records all Cortana voice commands.

We were too lazy to get up and walk over to a TV to change the channel so now we have remotes. Now we are even lazier because there are smart-TVs which listen for commands using voice-recognition features. This means the TV is constantly listening to all your conversations in your room, uploading those to the Internet to be processed, and determining if there are any commands in those voice recordings. They also save all the recordings for an undetermined amount of time to improve their products.

And if you still aren’t convinced big brother is watching you, we now allow our children to talk to Barbie, have that information uploaded and processed, and reply back. Parents can choose to have those audio files of conversations stored on a website which means hackers can access them as well. The “Hello Barbie” app (iOS and Android) uses authentication credentials that can be reused by hackers. It also connects a mobile device to any unsecured WiFi network who’s name includes the word barbie. You can use that information to access the home WiFi network and also everything that Hello Barbie is recording.

Read more