Celebrities Are Lures For Scammers

“Just Google it.” You’ve probably heard this phrase a thousand times before, and for good reason—search is one of the top activities we do online[1]. But while you are searching online for information and content, keep in mind that scammers are also searching for victims.

Scammers have been very productive in creating fake or infected websites, which are designed to do harm to your computer, your finances or your identity. The bait that lures us to these infected websites may be the latest Twitter trend, a breaking news story, a significant world event, downloads, and even celebrity pictures or gossip. And, the more popular the search, the more likely you are to run into dangerous results.

For the 6th year in a row, McAfee researched popular culture’s most famous people to reveal which ones are the riskiest to search for online. Emma Watson has taken over the #1 spot from Heidi Klum as the Most Dangerous Celebrity to search for on the Web (#riskyceleb). This year also marks the first time that the entire Top 10 list is comprised of all women. The top 10 celebrities from this year’s study with the highest percentages of risk are:

Cybercriminals often use the names of popular celebrities to tempt viewers to visit websites that are actually laden with malicious software. Anyone looking for the latest videos or pictures could end up with a malware-ridden computer instead of the trendy content they were expecting.

And beware of “free” things. Scammers know that this is a word that can get a lot of attention and will use this as a way to get to you. This year, when searching for “Emma Watson and ‘free’ downloads,” and “Emma Watson and hot pictures” and “Emma Watson and videos” you run the risk of running into online threats designed to steal your personal information.

Here’s some tips to help you stay safe while searching online (whether it be from your PC or mobile device):

Use common sense: if it sounds too good to be true, it probably is.

Always double-check the web address (URL) that you are going to. For example, if you are searching for Amazon.com and get a result for “Amazzon.cn”, you should know not to click.

Use a safe search plug-in, such as McAfee® SiteAdvisor® software that displays a red, yellow, or green ratings in search results, warning you to potential risky sites before you click on them.

Use comprehensive security software to protect against the latest threats.

Robert Siciliano is an Online Security Evangelist to McAfee. Watch him discussing information he found on used electronic devices YouTube. (Disclosures)

Travel Safety – Part 2: How to Protect your Luggage in Airports

Unfortunately, more and more airport security reports are coming in that the baggage handlers themselves are actually slicing open your luggage with razor blades and removing your valuables. For your travel safety, follow these security tips to protect your luggage in airports:

  1.  Follow FAA guidelines for what to pack, what you can’t pack and how much you can pack. What a passenger can and cannot take on a plane is listed on www.FAA.gov and no exceptions are made.
  2.  If you must check your luggage, wait to see it go into the “chute” after it is taken from you.
  3. When riding in a shuttle bus, don’t let your luggage leave your side no matter what. The rear compartment can be opened while the bus is stopped at a traffic light. People are constantly getting on and off the bus at different stops just to steal luggage.
  4. Because tags fall off or get ripped off, put photocopies of your passport, ID, and itinerary in your luggage. In case a bag gets lost, someone who recovers it will be able to forward it to you.
  5. Place any baggage, laptops, or briefcases on the counter in front of you when you stand at rental car, hotel, and airport ticket counters. If you put these at your feet to the left, right, or behind you, you become a prime target for distraction thieves. For example: a very emotional person walks up to you while you are waiting for the clerk at the counter, asks you how to get to the Alamo, and then starts to cry. In the confusion, an accomplice sneaks up behind you and removes the laptop that you placed on the floor next to you.
  6. Don’t take your eyes off your belongings while they are going through security or screening checkpoints. This is a prime location for distraction thieves to steal laptops, pocketbooks, and briefcases. Once you put your belongings on the movable belt, one thief distracts you from immediately going through the metal detector by either dropping a handful of change, causing a scene, clipping a metal object to the back of your coat that will cause a delay, or saying, “Hey, don’t I know you?”— anything to keep you from going through the metal detector for 30 seconds while the accomplice walks through clean and picks up your belongings. If you become distracted for an instant your valuables are gone! With security as tight as it is and all the security camera systems, this crime is harder to commit but still being done.
  7.  Never leave your bags unattended. They can be stolen. It happens every day. Do not overstuff your luggage. It can pop open easily. In addition, stuffed luggage looks to a thief as if there might be something of value in it.
  8.  Don’t use fancy, expensive luggage. It’s a red flag to a thief.
  9.  Put all electronics, cash, jewelry, medicine, and important papers in your carry-on luggage.
  10.  Trust your gut. Instincts play a huge role in your personal security.

Robert Siciliano personal and home security specialist toHome Security Source discussing ADT Pulse on Fox News. Disclosures

Mobile Device Security in a BYOD World

In the real world there is little difference between an employer’s issued device and a personal mobile device. The most important difference should be that a digital device issued by your employer requires and should have a “company mobile liability policy”. Businesses generally provide and pay for employee mobile devices, and also strictly dictate what you can or cannot do on the device. For IT security reasons, the employer may have remote capabilities to monitor activity and in the event of loss or employee termination wipe the data.

Mobile device security policies” are for the BYOD or “Bring Your Own Device” employees. The employee may pay for the device and its monthly plan and has also imposed security restrictions and limitations on employees who use their personal devices at work.  If you choose to use your personal device for employment purposes at any time for any reason then your employer may take control over that device to protect themselves. In a company mobile liability policy, the employer often has remote capabilities to monitor activity and in the event of loss or employee termination wipe the data.

A recent study shows less than 10% of people BYOD employees auto lock their tablets and people were more security-savvy about their smartphones, with 25% locking.

Most employee issued mobile management software will require the device to be locked and the password to be changed quarterly. These mobile device security programs tell you in the terms and conditions that the contents on the device is subject to being monitored and at any time the device can be wiped by the employer.

The employer is liable for potentially lost data on your mobile. So, to maintain security in a BYOD world, plan on giving up some liberties.

Robert Siciliano personal and small business security specialist toADT Small Business Security discussing ADT Pulse on Fox News. Disclosures

IT Security – Get a BYOD Policy Now!

Your companies IT person is tasked with managing numerous digital devices like mobile phones, tablets and any other portable device that communicates. Small businesses and IT managers must have IT security policies to manage devices attached to the network. Start looking at security vendors who provide solutions to keep track of, lock down, and secure your small business devices.

Consumers have at best a basic knowledge of IT. Consumers like gadgets and want to know how they work and at work they need to use technology to use it. This process is how the majority gets up to speed on technology and learn personal technologies they acquired for home use to make their work lives better than even the technology their workplace provides them. This is the consumerization of IT.

The issues of “BYOD” or Bring Your Own Device to work is a huge problem for IT managers at small businesses everywhere. Most IT managers have a pretty good handle on the company laptops desktops, and mobiles, but they are quickly losing control when employees bring their new Android mobile device and connect it to the corporate network.  Now they have to worry if that last application that was downloaded is infected and will infect the network when plugged you into a company PC to update or sync something.

Help the IT manager protect your small business network by:

  • Check to see if your business has a BYOD policy
  • Lock down your mobile device in case it’s lost or stolen
  • Install a “lost/locate/wipe” software on your device
  • Never leave your device exposed/unattended in an automobile.

 Robert Siciliano personal and small business security specialist toADT Small Business Security discussing ADT Pulse on Fox News. Disclosures

 

Travel Safety – Part 1: Top Airport Security Tips

Airports are another haven for criminals. In the parking lot lurks the car thief and the mugger. Throughout the terminal are the scam artists and the pickpockets. In the baggage claim area are the baggage thieves. The 9-11 tragedy was a humbling event that has made all passengers much more accommodating to security personnel and their screening methods.Follow these top airport security tips to keep your travel experience simple:

  1.  Follow FAA guidelines. Dos and don’ts for travel safety and airport security have been implemented and revised since the 9-11 tragedy. There is no flexibility in these rules.
  2. During security screening be alert to anyone around you who is nervous, perspiring, impatient, or argumentative. With the new FAA orders in place, it’s common knowledge that screening will take a while. So anyone not complying with the new rules to any degree should raise a red flag.
  3. If you must check your luggage, wait to see it go into the “chute” after it is taken from you.
  4.  When booking your reservation, get a seat at the front of the plane so you can get to baggage claim quickly. That’s because luggage is either carried on, lost, or stolen, or—if you are lucky—waiting at baggage claim.
  5. Never accept anything from strangers and watch your luggage. Someone may be looking for the opportunity could hide bombs or drugs in your bags. Terrorists can conceal plastic explosives or other lethal weapons in articles that someone would ordinarily purchase at the terminal newsstand, such as a book, soda can, candy bar, or magazine. Such devices can be wired with components from cell phones, and when called from the ground moments after takeoff can trigger an explosion.
  6.  Ignore other people arguing and strangers who are overly friendly. These could be staged distractions to make it easier for a thief or pickpocket to rob you.
  7. Be alert to anyone in the baggage claim area paying undue attention to you.
  8. Don’t let anyone help you with your airport locker (if you can even find one nowadays). Someone might insert quarters for you to appear helpful but then give you a different key without your knowledge.
  9. Be aware of any contact with others, even if it is a good deed they are doing. They could be setting you up.
  10. Trust your gut. Instincts play a huge role in your personal safety.

Robert Siciliano personal and home security specialist toHome Security Source discussing ADT Pulse on Fox News. Disclosures

Household Safety: It’s Mold Awareness Month!

House mold is no joke. Mold makes you sick, makes your house sick and ruins properties if left untreated. Keeping mold under control is critical for household safety.

The Department of Health in New York defines mold as “Molds are microscopic organisms that live on plant or animal matter. They aid in the breakdown of dead material and recycle nutrients in the environment. Present virtually everywhere, they can be found growing on organic material such as soil, foods, and plant matter. In order to reproduce, molds produce spores, which spread through air, water, or by insects. These spores act like seeds and can form new mold growth if the conditions are right.”

Mold gets into your house as a result of moisture. That moisture can come from a flood, leaky roof, plumbing leaks, cooking steam, heating steam, humidifiers, wet clothes drying inside a home, or condensation accumulating inside crawlspaces from any of the above.

For your family safety, here are the most important things you should know about mold, according to the Environmental Protection Agency.

Ten Things You Should Know About House Mold

  • Potential health effects and symptoms associated with mold exposures include allergic reactions, asthma, and other respiratory complaints.
  • There is no practical way to eliminate all molds and mold spores in the indoor environment; the way to control indoor mold growth is to control moisture.
  • If mold is a problem in your home or school, you must clean up the mold and eliminate sources of moisture.
  • Fix the source of the water problem or install a water leak detector to prevent mold growth.
  • Reduce indoor humidity (to 30-60%) to decrease mold growth by: venting bathrooms, dryers, and other moisture-generating sources to the outside; using air conditioners and de-humidifiers; increasing ventilation; and using exhaust fans whenever cooking, dishwashing, and cleaning.
  • Clean and dry any damp or wet building materials and furnishings within 24-48 hours to prevent mold growth.
  • Clean mold off hard surfaces with water and detergent, and dry completely. Absorbent materials such as ceiling tiles, that are moldy, may need to be replaced.
  • Prevent condensation: Reduce the potential for condensation on cold surfaces (i.e., windows, piping, exterior walls, roof, or floors) by adding insulation.
  • In areas where there is a perpetual moisture problem, do not install carpeting (i.e., by drinking fountains, by classroom sinks, or on concrete floors with leaks or frequent condensation).
  • Molds can be found almost anywhere; they can grow on virtually any substance, providing moisture is present. There are molds that can grow on wood, paper, carpet, and foods.

 

Robert Siciliano personal and home security specialist toHome Security Source discussing ADT Pulse on Fox News. Disclosures

Investment Fraud: How to Avoid Ponzi Schemes

In response to National Fraud Awareness Week it’s important to bring attention to the biggest and worst investment fraud of all: the Ponzi Scheme.

Wikipedia defines a Ponzi scheme as fraudulent investment operation that pays returns to its investors from their own money or the money paid by subsequent investors, rather than from profit earned by the individual or organization running the operation. Ponzi schemes usually entice new investors by offering higher returns than other investments, in the form of short-term returns that are either abnormally high or unusually consistent. Perpetuation of the high returns requires an ever-increasing flow of money from new investors to keep the scheme going.”

The SEC has some advice for those concerned they might get hooked into a Ponzi scheme: Whether you’re a first-time investor or have been investing for many years, there are some basic questions you should always ask before you commit your hard-earned money to an investment.

The SEC sees too many investors who might have avoided trouble and losses if they had asked questions from the start and verified the answers with information from independent sources.

Whether you are concerned with identity theft or considering your next investment opportunity, start with these five questions:

Is the seller licensed?

Is the investment registered?

How do the risks compare with the potential rewards?

Do I understand the investment?

Where can I turn for help?

For more information, read Investing Smart from the Start: Five Questions to Ask Before You Invest

Robert Siciliano personal and home security specialist to Home Security Source discussing ADT Pulse on Fox News. Disclosures

Top Security Tips against Home Invasions

In one of the worst publically known home invasions of the 21st century both defendants received the death penalty. Joshua Komisarjevsky, confessed to the attack on the home and family of Dr. William Petit, and the murders of his wife, Jennifer Hawke-Petit, 48, and girls Michaela Petit, 11 and Hayley Petit, 17.

His partner in this horrendous crime convicted killer and home invader on death row Steven Hayes wrote letters confessing to up to 17 murders of women over the course of his life. The New Haven register reported a while back he noted “Yes, I’ve killed before,” Hayes bragged. “I have 17 kills throughout the Northeast United States. Perfect victims and well executed, controlled endeavors.”

In an AP interview with Komisarjevsky when asked about his death sentence he responded “I don’t think I’ll be executed against my will, I think if I volunteer, the state will execute me.”

Here are some home security tips to protect yourself and family:

Get armed: Having a non-lethal weapon in the form of a Taser or a Pepper spray in close proximity to your bed or front door can debilitate your attacker before they gain control. But realize these can be used against you.

Have your mobile handy: Consider a second line or a cell phone in your bedroom. Burglars sometimes cut phone lines and often remove a telephone from the receiver when they enter a home.

Get alarmed: An alarm system activated while you are sleeping will prevent a burglar from getting too far without you knowing it. And keep it on 24/7/365. With a home alarm systemon, when someone knocks on the door, a conscious decision has to be made to turn off the alarm. Most people will keep it on.

Locks: Call a qualified locksmith to take a physical security survey to help you determine the most efficient way to lock up. Many products on the market are a false sense of security. A qualified locksmith should be a professional associated with well-known manufacturers.

Robert Siciliano personal and home security specialist to Home Security Source discussing ADT Pulse on Fox News. Disclosures

Are Your Mobile Apps Up To No Good?

Most of us have heard the saying “It’s 2am, what are your kids doing?” and you may know, but do you know what your mobile apps are doing? I know before I started working in the industry, I would not have given a second thought to this, but consider this.

Why would an app designed to monitor your mobile’s battery need to know your location via your GPS? How come some gaming applications ask users for their phone numbers? Mobile applications, especially free ones, require some level of your personal data in order to supplement development costs. This means “free” isn’t exactly free.

Unsurprisingly 97% of users don’t understand how permissions correspond to the risk of an app. The consequences of not knowing is once you share your personal data, it now can be use and sometimes abused and is out of your control forever. Check out this infographic…

 

If it’s digital then that means it’s also “repeatable” and can be copied, pasted, duplicated and sent an infinite amount of times. For example 18.3 million US adult Smartphone owners have looked up medical information.  32.5 million US adult Smartphone owners access banking information. Using applications that don’t care much about your privacy can expose this data.

Android applications can ask for 124 types of permissions and with these permissions someone can turn on your camera, monitor or modify or even kill outgoing calls, record images of your screen while you enter personal information, monitor and view texts or pictures and even scarier capture conversations in the room when no call is active!!

What’s troubling is 33% of apps ask for more permissions than they need, 42% of users don’t know what these permissions are and 83% of users don’t pay attention to permissions when installing an app. This all adds up to needing to know what your apps are doing.

To help you protect your privacy and identity when using apps you should:

Research apps by checking their ratings and reviews before you download

Only download apps from reputable apps stores

Read the Terms of Service (TOS) to determine what data the app is going to access on your mobile device.

Use comprehensive  mobile security app with app privacy features, such as McAfee Mobile Security, that will provide insight into the activity and safety of your apps

Robert Siciliano is an Online Security Evangelist to McAfee. Watch him discussing information he found on used electronic devices YouTube. (Disclosures)

Home Fire Safety: National Pet Fire Safety Day

Did you know that your dog, cat or bird might be responsible for burning down your house? I didn’t even know they know how to light a match? I’m definitely not letting my dog smoke in bed. Seriously, this is a statistic put out by the National Fire Protection Association and they would know.

Lamps: Here how it might happen, and it makes sense: You leave a lamp on, and your cat starts playing with the lamp cord or even the lamp shade if it has those little fabric bally things on it. Next thing you know the lamp falls down on the carpet, the light breaks and causes some sparks to fly on the rug. Poof…there’s your home fire.

Candles: Worse, humans might be partly at fault if they leave an unattended candle out. A cat, dog or bird can easily knock over a candle causing a fire. For your pet safety, be sure candles are in secure holders on a hard surface. Candles are just the worst anyway, get rid of them. Sorry. They’re messy too and they ruin your paint.

Stoves: Cats climb all over stuff which is why there are no cats in my house. I mean, litter box then your bed? Anyway, a cat climbing on your stove is likely to turn a stove knob, which if electric will fry the cat, but if gas will blow up the house. Remove the knobs from the stove.

Electric heaters: Animals running around the house can knock over a space heater. Once on its face can burn things. Most electric heaters today have some form of heat sensor that shuts it down. Make sure that’s the case and toss old ones that don’t.