Entries by Robert Siciliano

Protect your Privacy on your iPhone

If you have an iOS device, you may be leaking personal information about yourself—without even knowing it—because you’re not familiar with the privacy settings. Apps have “permissions,” meaning, they can access private information such as your social calendar stored on the phone, appointments, anything. Go to the privacy menu under “settings” to learn which apps…

How to Use your Mobile as a Child Locator

How many times have you read, or at least caught a headline, of the latest high profile missing child case? How many stories have we heard about the kid who got lost on a hike? His body was found several miles from where he’d been last seen, concluding a several-day search. What if he had…

Your ransomware profile: passwords, profiles and protection

If your computer password contains the name of your dog, your favorite vacation spot, and an easy-to-remember numerical sequence, then you are breaking some basic rules of password safety. Even though “BusterBermuda789” might seem impenetrable to you, this is a password security experts say is vulnerable. Here are five things to know about passwords: A…

Set Privacy on these Social Media Apps

Just like older generations never thought that the dial phone in the kitchen could be dangerous (think phone scams), today’s kids don’t have a clue how hazardous smartphone apps can really be. They are a godsend to pedophiles, scammers and hackers. And let’s not forget other kids who just want to be cruel bullies. Parents…

5 Improvised Secret Self-Defense Weapons

Cane If you use a cane, take “cane-fu” classes if possible. Yes, it’s a thing. A sturdy cane with a strong handle works best. Do not assume you can fight with a cane just because you need one to walk. Avoid a cane with a hidden knife or sword unless you specifically train to fight…

Strengthen your Entry way Security

Did you know that often, burglars gain entry by simply kicking open locked doors? You just would not believe how easy this is. This is why it’s crucial to beef up the strength of your house’s doors. And this can be done several ways. Deadbolt Strike Plate It’s ironic that this piece of hardware is…

Phishing attacks Two-Factor Authentication

Hackers bank heavily on tricking people into doing things that they shouldn’t: social engineering. A favorite social engineering ploy is the phishing e-mail. How a hacker circumvents two-factor authentication: First collects enough information on the victim to pull off the scam, such as obtaining information from their LinkedIn profile. Or sends a preliminary phishing e-mail…

Your Ransomware Response: Prepare for the Worst

A ransomware attack is when your computer gets locked down or your files become inaccessible, and you are informed that in order to regain use of your computer or to receive a cyber key to unlock your files, you must pay a ransom. Typically, cybercriminals request you pay them in bitcoins. The attack begins when you’re…

32 Million Twitter Pass for sale Add two-factor NOW

The Dark Web, according to LeakedSource, got ahold of 33 million Twitter account details and put them up for sale. Twitter thus locked the accounts for millions of users. Twitter, however, doesn’t believe its servers were directly attacked. So what happened? The bad guys may have created a composite of data from other breached sources.…