Posts

How to Secure Your Home or Business On the Cheap

It doesn’t matter who you are or where you live, your home is at risk of being burglarized. According to numerous studies, in the US alone, a burglary occurs about once every 18 seconds, which equates to about 5,000 a day.

5WFortunately, you can secure your home or business against burglary, and it doesn’t have to cost you a fortune. Here are 5 ways that you can get peace of mind on the cheap:

  1. Repurpose Your Smartphone
    If you are like most, you probably have an old smart phone hanging around just collecting dust in a drawer. For free or a small fee, you can download apps for both Android and iPhone devices that allow your smart phone to become a surveillance system with almost no effort on your part. Simply search “Surveillance app” in your devices app store.
  2. Speaking of Cameras…
    Of course, you can always just buy a surveillance camera for your business or home. These are often network cams and are easy to use and affordable. These low cost security cameras are often motion-activated cameras that sends a live stream and alerts to the user’s smartphone via the cameras app. Some of the features to look for include:

    • Night Vision
    • Wide-angle lens
    • Siren
    • Automatic detection of animals

    You can buy the systems at major retailers, and it start as low as $50.00.

  3. Set Up Some Tripwires
    Sometimes simple and traditional is best, and tripwires can really do a nice job of protecting your home or business, and you can get them for as little as $20. In fact, with a bit of ingenuity, you can even make your own. Some of them have a loud sound, too, similar to a gunshot, which will seriously scare anyone who is sneaking around where they shouldn’t be. These are low-tech and perfect for anyone wanting to beef up their other security systems, as a multi-layer approach to security is best. Search “trip wire alarm” on eBay or YouTube for all kinds of options.
  4. Get a Guard Dog
    If the traditional approach appeals to you, consider a guard dog. People have been using guard dogs to protect their property since the time of Ancient Rome, and one of the most popular breeds for this type of work is the German Shepherd, Doberman or Belgian Malinois. These dogs are large, strong, and intimidating, and you definitely wouldn’t want to cross paths with one that was trained to keep you off its property. Just keep in mind, whatever breed you choose, that you must get a professional trainer for the best results.
  5. Make a Pact With Your Neighbors
    One of the best ways to protect your property is to work with your neighbors and keep an eye on each other’s homes. For example, if you know your neighbor is going on vacation and you have more than one car, park one of them in their driveway. This way, it looks as if someone is home. You also should take their mail in because burglars know if there is a lot of mail in the box, the home or business owner likely isn’t around.

Robert Siciliano personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen. See him knock’em dead in this identity theft prevention video.

Oh No, iOS Hacked by NSO

Recently, says a report at wired.com, it’s been unveiled that the obscure Israel-based NSO Group has been selling spyware delivered to smartphones through vulnerabilities in Apple’s iOS operating system.

“Pegasus” spyware can put a surveillance out on nearly everything including keystrokes, e-mails, video feeds and phone calls. Apple says that the three vulnerabilities with this spyware (“Trident”) have been patched.

In short, NSO Group’s spyware has been reverse engineered for the first time—achieved by the security research firm Lookout, which discovered Pegasus. Also getting credit for the discovery is Citizen Lab.

  • Ahmed Mansoor, a well-known human rights activist with a history of being targeted by surveillance spyware, sent the security firms the suspicious SMS text messages he had received.
  • Mansoor’s mobile device was running iOS’s latest version when two phishing texts came in with links. He had refused to click them.
  • Instead he sent screenshots to Citizen Lab. The links led to a blank Safari browser page. The analysis then began.
  • The spyware was intended to jailbreak the phone.

Jailbreaking an iPhone means the user can bypass Apple’s plan and customize the experience. However, in the Pegasus case, remote hackers wanted this control.

Citizen Lab and Lookout took their analysis to Apple, who made the patches within 10 days. The recommendation is to regularly download the latest iOS versions to help protect the device from attacks. The latest iOS version will stop Pegasus. However, it’s possible for NSO to infiltrate other phone operating systems like Android with the spyware, says Citizen Lab and Lookout.

NSO Group has no website, and supposedly, earns $75 million a year, with governments as the typical clients, and may have up to 500 employees. It won’t be any surprise if a new and similar threat follows soon, as the NSO Group is quite advanced, with a solid software development organization.

Robert Siciliano CEO of IDTheftSecurity.com, personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen. See him knock’em dead in this identity theft prevention video.

What is the Signaling System No. 7 Network?

The iPhone has a vulnerability called the Signaling System 7 (SS7) that allows crooks to hack into the device.

4WThis was demonstrated on a recent “60 Minutes” episode in which a U.S. congressman (with his permission) had his iPhone hacked by German cybersecurity experts. The white-hat hackers got his phone number and eavesdropped on the conversation.

Penetration of the flawed SS7 makes it possible to listen in on conversations, intercept texts and track the victim’s movements. The congressman subsequently called for an investigation into the vulnerability.

The vulnerability was initially unearthed in 2014 at a German hacking conference. This SS7 flaw is not just a U.S. phone carrier problem, either. Mobile device carriers around the world are affected by this as well. A global attack on this vulnerability is very much warranted.

The criminals who carry out these attacks have a strong preference for targets who are not the regular Joe or Jane, but people of political significance or who represent major organizations.

So regardless of how “important” you are, what can you do?

  • Your mobile device should be fully equipped with security software.
  • Make sure that this software is always updated. Do not ignore update alerts.
  • You should not rely on just a single layer of security, no matter how strong.
  • Also keep in mind that skilled hackers can figure out ways to circumvent a layer of security. The more layers that your iPhone has, the less likely a crook will be able to penetrate it.
  • Load up on the layers of protection, which include a passcode and biometrics such as a fingerprint scanner. Go for depth.

Robert Siciliano CEO of IDTheftSecurity.com, personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen. See him knock’em dead in this identity theft prevention video.

Protect your Privacy on your iPhone

If you have an iOS device, you may be leaking personal information about yourself—without even knowing it—because you’re not familiar with the privacy settings.

1PApps have “permissions,” meaning, they can access private information such as your social calendar stored on the phone, appointments, anything. Go to the privacy menu under “settings” to learn which apps can gain this access and deactivate it. And there’s so much more to know…

Ads

  • The Limited Ad Tracking option controls how targeted the ads are to your habits, not the amount of ads you see.
  • This feature does not apply to ads across the Internet; only the iAds that are built into apps.

Location

  • At the screen top is a Location Services entry.
  • Explore the options.
  • Shut down everything not needed beyond maps or “Find My iPhone”

Safari, Privacy

  • Check out the Allow from Current Website Only option; it will prevent outside entities from watching your online habits.
  • You can limit how much Safari tracks your habits (by activating Do Not Track requests).
  • You can also disable cookies, but you won’t prevent 100 percent of the data collection on you.
  • Want all cookies and browsing history deleted? Choose the Clear History and Website Data option.
  • In the Settings app, go to Safari, then Search Engine to change the default search engine if you feel the current one is collecting too much data on you.

Miscellaneous

  • Every app has its own privacy settings. For every app on your device, you should explore the options in every privacy menu.
  • Set up a time-based auto-lock so that your phone automatically shuts off after a given time if you’re not using it.
  • The fewer apps you have, the less overwhelmed you’ll be about setting your privacy settings. Why not go through every app to see if you really need it, and if not, get rid of it?

Robert Siciliano CEO of IDTheftSecurity.com, personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen. See him knock’em dead in this identity theft prevention video.

Apple’s bizarre Crashing Text and how to fix

Of all the weird things that can happen to your iOS device, the latest is a relatively benign situation in which a string of text is sent to the phone…and it causes the phone to crash.

http://www.dreamstime.com/stock-images-online-risks-sign-road-banner-image34668294The phone will reboot if the particular nonsensical text string is received while the phone is locked.

Data won’t be stolen; nobody will gain remote control of your device (yet); but heck, who wouldn’t be very annoyed that their phone crashes? And this is going on all over the world. The text characters can also be sent from any device. Apple says it will get this problem fixed.

But in the meantime, there are things you can do to undo the problem.

Mac Users

  • Reply to the gibberish text in iMessage, and the reply can be any string of text.

If you don’t have a Mac:

  • Send a text message via a third-party application by using its share feature.
  • Ask Siri to issue a reply or “read unread messages.” Then reply to free your Messages.
  • When you’re in Messages, delete the whole chain.
  • If you know who sent the crazy message, ask them to send a follow-up message.

A software update will soon be coming from Apple that will include a fix to this situation.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

In with the New, out with the Old

If you plan on getting a new smartphone, have you ever thought of what the next user of your old smartphone will find on it?

7WThis assumes you’ll be selling or donating it, of course. Are you SURE those risqué photos are totally gone, or that your diary entries have been wiped clean? Experiments have been conducted in which someone buys used smartphones for the sole purpose of seeing how much personal data was left behind by the previous owner. I’ve done one, it wasn’t pretty. We found data on half the devices we bought in the second hand market.

It’s unbelievable how much data was retrieved in these experiments, including addresses, e-mails, passwords and text messages. A factory reset is not a totally reliable way to wipe clean your smartphone, either, as shown by the fact that some Android phones, despite the factory reset, still contained the previous user’s data.

Before taking the first step in getting rid of your mobile phone, back up all of its data. This can be done with a flash drive or automated PC service. For Android and iOS, use Apple’s iCloud or Google’s Auto Backup.

Next, wipe your phone squeaky clean. No, not with a rag and bleach, but “wipe” means destroy all the data using a specific method. This is NOT done by hitting the delete button or even reformatting the hard drive. What you don’t see isn’t necessarily not there.

A reformatted hard drive can still contain your data. To wipe an Android or iOS, use Blancco Mobile. To wipe a Mac computer, use the OS X Disk Utility or WipeDrive. For Windows PC use Active KillDisk. If you use a factory reset for a smartphone, remove any SIM cards too.

What if you can’t wipe your device? If you don’t wish to give it to someone else, then literally destroy it. Don’t just toss it in the trash. Take out the hard drive and mutilate it with a hammer. If you do want to sell it or donate it (get the receipt if you do donate it for an IRS return), realize that your data will still be on it. You never know who will end up getting their hands on the device.

If the idea of hammering at the hard drive isn’t your cup of tea, then find out from the recycling company who conducts the downstream recycling. You don’t want your device—containing your data—getting into a foreign landfill. The recycling company should be part of R2, or “responsible recycling,” or be part of e-Stewards certification programs.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.

Apple Makes Life Harder for iPhone Thieves

You probably know that iPhones are high on the wish list of thieves all over the country—so much so that data from the New York City Police Department reveals that iPhone and iPad thefts have soared 40 percent compared with the same period last year, according to CNET. A total of 11,447 cases of stolen Apple devices were reported to the city’s police, an increase of 3,280 over the last year.

Apple has been paying attention, and the new iOS7 has made it difficult for a thief to sell or reuse that stolen phone. This is because of a feature that prevents a wiping/resetting of the phone without the user’s Apple ID.

Here’s how: iPhone users who upgrade receive an email explaining how the new theft deterrent works, along with information on what to do in the event someone sells or transfers an iPhone to another party. It looks like this:

Dear Apple iPhone Customer:

Congratulations on your update to iOS 7. As an iCloud user, part of your upgrade includes new features built into Find My iPhone that make it harder for anyone else to use or sell your device if it is ever lost or stolen.

With Find My iPhone turned on in iOS 7, your Apple ID (email@xxxx.com) and password will always be required before anyone can:

•           Turn off Find My iPhone on your device.

•           Erase your device.

•           Reactivate and use your device.

There is nothing you need to do except to keep Find My iPhone turned on and remember your Apple ID and password. For more information, read the FAQ.

Note: As always, if you plan to give your device to someone else, make sure to erase all content and settings before transferring it to the new owner. This will remove the device from your account and allow the new owner to activate it. For more information, read What to do before transferring ownership of your iPhone, iPad or iPod Touch.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.

Managing Family Time On The iPad or iPhone

On our way home from a recent family vacation, my two year old grew understandably anxious and uncooperative while waiting for a flight in an airport terminal. So I handed over my iPhone, hoping to distract her. Within seconds, she had launched the photo application and begun scrolling through the videos of our trip. She’d watch a video, giggle a little, and then scroll to the next. This went on for about ten minutes.

During this time, a small crowed gathered near my kid. I realized that they were marveling at my daughter’s ability to work an iPhone like an adult. But while she may be pretty smart, it was Steve Jobs’ brilliance that created this magical device that passes both the grandmother and toddler tests.

Parents everywhere are equipping their families with digital devices for numerous reasons. There are many advantages and some disadvantages to this practice. Most, but not all, of the applications available on the iPhone and iPad are more or less harmless. The web as whole, though, is fraught with content a child should not be exposed to. The following are helpful tips to address these concerns:

1. Engage in ongoing dialog. Become as savvy about these devices as your child may be, and spend at least as much time using them as they do, if not more. Set firm boundaries regarding what is and is not permitted.

2. Enable restrictions. Go to Settings > General > Restrictions and apply a passcode to any applications your kids shouldn’t be using. Children shouldn’t be exploring the Internet via Safari or YouTube on their own. Lock down the App store, too, otherwise this could become costly.

3. Set appropriate times. We learned the hard way that any digital activities in the early morning can make it difficult to get them ready for school. The same goes for right before dinner, homework, or bed. It’s tough to peel a kid away and readjust their senses to their real world responsibilities.

4. Set time limits. Addiction to gaming and virtual worlds is a real thing. Allowing a child unlimited access to television is bad enough. Allowing a child unlimited access to the digital world could cause behavior issues. We don’t allow any more than 15 or 20 minutes per hour on any game, and no more than 45 minutes in a day. Usually, they don’t want to spend more time than that, because they have so many other fun activities.

For more tips on protecting your kids online, visit JustAskGemalto.com.

Robert Siciliano, personal security expert contributor to Just Ask Gemalto. Disclosures

Cloud Home Security is Here

A burglary occurs every 15 seconds. The chance of your home being broken into is higher than you’d think. The good news is that today’s alarm systems are “not your father’s alarm.” Twenty years ago, a contractor had to spend a week tearing up your walls, ceilings, and windows to retrofit a messy, hardwired security system. These alarms were so expensive that they were mainly used by businesses, rather than in private homes.

Since then, home security systems have dropped in price. They are now mostly wireless, right down to the cellular phone signal. But what makes home alarms even more exciting is that the majority of the functions are cloud-based.

I have the “ADT Pulse,” which marries home security with automation. From almost anywhere — on the road, in your office, or even at the beach — you can access your cloud-based smart home system. Depending on the plan you select, this system can provide an unprecedented level of control with Z-Wave wireless technology, your own personal command center, compatible mobile phone, and interactive touch screen security system.

Using my iPhone or any computer, I can access a cloud-based server that allows me to watch live footage from each of the 16 cameras I have installed in and around my property. The cameras also begin recording automatically whenever motion is detected, and that footage is stored in the cloud and available to me anywhere, any time. It’s amazing how often I access these cameras when I’m on the road.

With home automation, I can use the cloud to remotely switch lights on and off and adjust the temperature control system. I also get alerts in the event of an intruder or even a broken water pipe!

Having a cloud-based, Internet-connected home security system certainly provides an excellent layer of protection, not to mention peace of mind.

Robert Siciliano, personal security expert contributor to Just Ask Gemalto. Disclosures

Check Out These Hurricane Prep Apps

Hurricane Irene whacked the east coast over two weeks ago and people are still pumping out. Roads are still messed up and life has changed for many. My property was in the path, although she went a little west of me so I was spared any damage.

But if she did head a little east I was prepared. What helped me prepare was technology. For almost a week I had sms text messages coming into my iPhone via iMapWeather Radio.

iMapWeather Radio 9.99: only app offering critical voice and text alerts on life-threatening weather events. Your iPhone will “wake up” and also “follow you” with alerts wherever you go. Listen with ease to local weather forecasts while you are on the move. Enjoy the power of a Weather Radio, with all the convenience and precision of a smart phone.

The Weather Channel FREE: Looking for the most accurate weather information available? The Weather Channel’s staff of 200+ meteorologists, along with our patented ultra-local TruPoint(sm) weather technology, allow to provide you with the weather tools you need to plan your day, week, or even the next hour.

National Weather Service’s National Hurricane Center FREE: isn’t an app at all. But it is the source of all apps information. You can go to the site and save the link as “Add to Home Screen”.

Robert Siciliano personal and home security specialist to Home Security Source discussing self defense on NBC Boston. Disclosures.